Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-0466
Vulnerability from cvelistv5
Published
2020-12-14 21:50
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel
References
▼ | URL | Tags | |
---|---|---|---|
security@android.com | https://source.android.com/security/bulletin/2020-12-01 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2020-12-01 | Patch, Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:51.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2020-12-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Android", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Android kernel" } ] } ], "descriptions": [ { "lang": "en", "value": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel" } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T21:50:04", "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "shortName": "google_android" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://source.android.com/security/bulletin/2020-12-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2020-0466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Android", "version": { "version_data": [ { "version_value": "Android kernel" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2020-12-01", "refsource": "MISC", "url": "https://source.android.com/security/bulletin/2020-12-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "assignerShortName": "google_android", "cveId": "CVE-2020-0466", "datePublished": "2020-12-14T21:50:04", "dateReserved": "2019-10-17T00:00:00", "dateUpdated": "2024-08-04T06:02:51.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-0466\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2020-12-14T22:15:14.287\",\"lastModified\":\"2024-11-21T04:53:33.990\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel\"},{\"lang\":\"es\",\"value\":\"En las funciones do_epoll_ctl y ep_loop_check_proc del archivo eventpoll.c, se presenta un posible uso de la memoria previamente liberada debido a un error l\u00f3gico.\u0026#xa0;Esto podr\u00eda conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecuci\u00f3n adicionales.\u0026#xa0;No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. Producto: Android, Versiones: kernel Android, ID de Android: A-147802478, Referencias: kernel posteriores\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26\"}]}]}],\"references\":[{\"url\":\"https://source.android.com/security/bulletin/2020-12-01\",\"source\":\"security@android.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2020-12-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
rhsa-2022_0531
Vulnerability from csaf_redhat
Published
2022-02-15 10:43
Modified
2024-11-15 10:47
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0531", "url": "https://access.redhat.com/errata/RHSA-2022:0531" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0531.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-15T10:47:27+00:00", "generator": { "date": "2024-11-15T10:47:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:0531", "initial_release_date": "2022-02-15T10:43:56+00:00", "revision_history": [ { "date": "2022-02-15T10:43:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-15T10:43:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T10:47:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "bpftool-0:3.10.0-957.88.1.el7.x86_64", "product_id": "bpftool-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-957.88.1.el7.x86_64", "product_id": "perf-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-957.88.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.88.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.88.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-957.88.1.el7.src", "product": { "name": "kernel-0:3.10.0-957.88.1.el7.src", "product_id": "kernel-0:3.10.0-957.88.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.88.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.88.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-957.88.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-957.88.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-957.88.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.88.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "perf-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-957.88.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-957.88.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-957.88.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-957.88.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.88.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.src", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.src", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.src", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.src", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.src", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-957.88.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-957.88.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-15T10:43:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0531" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ], "organization": "Virtuozzo Kernel team" } ], "cve": "CVE-2021-4155", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2021-12-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034813" } ], "notes": [ { "category": "description", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "RHBZ#2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" } ], "release_date": "2022-01-10T06:36:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-15T10:43:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0531" }, { "category": "workaround", "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441", "product_ids": [ "7Server-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.ppc64le", "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.src", "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.88.1.el7.noarch", "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.88.1.el7.x86_64", "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.88.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL" } ] }
rhsa-2022_0533
Vulnerability from csaf_redhat
Published
2022-02-15 09:53
Modified
2024-11-15 10:47
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0533", "url": "https://access.redhat.com/errata/RHSA-2022:0533" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0533.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-15T10:47:42+00:00", "generator": { "date": "2024-11-15T10:47:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:0533", "initial_release_date": "2022-02-15T09:53:46+00:00", "revision_history": [ { "date": "2022-02-15T09:53:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-15T09:53:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T10:47:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-7.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-5.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-5.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-4.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-3.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "product_id": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-2.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1-debuginfo@1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1-debuginfo@1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1@1-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_80_1-debuginfo@1-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1@1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_84_1-debuginfo@1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_86_1-debuginfo@1-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-15T09:53:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0533" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ], "organization": "Virtuozzo Kernel team" } ], "cve": "CVE-2021-4155", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2021-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034813" } ], "notes": [ { "category": "description", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "RHBZ#2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" } ], "release_date": "2022-01-10T06:36:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-15T09:53:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0533" }, { "category": "workaround", "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441", "product_ids": [ "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_80_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_84_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.src", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-0:1-1.el7.x86_64", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.E4S:kpatch-patch-3_10_0-957_86_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL" } ] }
rhsa-2022_0529
Vulnerability from csaf_redhat
Published
2022-02-15 09:27
Modified
2024-11-15 10:47
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0529", "url": "https://access.redhat.com/errata/RHSA-2022:0529" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0529.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-15T10:47:13+00:00", "generator": { "date": "2024-11-15T10:47:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:0529", "initial_release_date": "2022-02-15T09:27:07+00:00", "revision_history": [ { "date": "2022-02-15T09:27:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-15T09:27:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T10:47:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-514.97.1.el7.src", "product": { "name": "kernel-0:3.10.0-514.97.1.el7.src", "product_id": "kernel-0:3.10.0-514.97.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.97.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-514.97.1.el7.x86_64", "product_id": "perf-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-514.97.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.97.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.97.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.97.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-514.97.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-514.97.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-514.97.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.97.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.97.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.97.1.el7.src", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.97.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.97.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.97.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.97.1.el7.src", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.97.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.97.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-15T09:27:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0529" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ], "organization": "Virtuozzo Kernel team" } ], "cve": "CVE-2021-4155", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2021-12-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034813" } ], "notes": [ { "category": "description", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "RHBZ#2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" } ], "release_date": "2022-01-10T06:36:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-15T09:27:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0529" }, { "category": "workaround", "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441", "product_ids": [ "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.src", "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.97.1.el7.noarch", "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.97.1.el7.x86_64", "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.97.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL" } ] }
rhsa-2022_0622
Vulnerability from csaf_redhat
Published
2022-02-22 17:02
Modified
2024-11-15 14:42
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)
* kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege (CVE-2020-0465)
* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)
* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update to the latest RHEL7.9.z12 source tree (BZ#2039101)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\n* kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege (CVE-2020-0465)\n\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z12 source tree (BZ#2039101)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0622", "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1920471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920471" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "1999544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544" }, { "category": "external", "summary": "2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "2044809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0622.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-15T14:42:25+00:00", "generator": { "date": "2024-11-15T14:42:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:0622", "initial_release_date": "2022-02-22T17:02:37+00:00", "revision_history": [ { "date": "2022-02-22T17:02:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-22T17:02:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:42:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "product": { "name": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "product_id": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.59.1.rt56.1200.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.59.1.rt56.1200.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.59.1.rt56.1200.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0465", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920471" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s multi-touch input system. An out-of-bounds write triggered by a use-after-free issue could lead to memory corruption or possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0465" }, { "category": "external", "summary": "RHBZ#1920471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920471" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0465" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "workaround", "details": "As the multitouch module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install hid-multitouch /bin/true\" \u003e\u003e /etc/modprobe.d/disable-hid-multitouch.conf\n\nThe system may need to be restarted if the hid-multitouch module is loaded. In most circumstances, a kernel modules will be unable to be unloaded while in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege" }, { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031930" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "RHBZ#2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation" }, { "acknowledgments": [ { "names": [ "HaoXiong, LinMa" ], "organization": "ckSec" } ], "cve": "CVE-2021-3564", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964139" } ], "notes": [ { "category": "description", "text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3564" }, { "category": "external", "summary": "RHBZ#1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/25/1" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails" }, { "cve": "CVE-2021-3573", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966578" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function hci_sock_bound_ioctl()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3573" }, { "category": "external", "summary": "RHBZ#1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2", "url": "https://www.openwall.com/lists/oss-security/2021/06/08/2" } ], "release_date": "2021-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function hci_sock_bound_ioctl()" }, { "acknowledgments": [ { "names": [ "Likang Luo" ], "organization": "NSFOCUS Security Team" } ], "cve": "CVE-2021-3752", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999544" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible use-after-free in bluetooth module", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3752" }, { "category": "external", "summary": "RHBZ#1999544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/", "url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4", "url": "https://www.openwall.com/lists/oss-security/2021/09/15/4" } ], "release_date": "2021-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible use-after-free in bluetooth module" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ], "organization": "Virtuozzo Kernel team" } ], "cve": "CVE-2021-4155", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2021-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034813" } ], "notes": [ { "category": "description", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "RHBZ#2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" } ], "release_date": "2022-01-10T06:36:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "workaround", "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL" }, { "cve": "CVE-2022-0330", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2022-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2042404" } ], "notes": [ { "category": "description", "text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible privileges escalation due to missing TLB flush", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "RHBZ#2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12", "url": "https://www.openwall.com/lists/oss-security/2022/01/25/12" } ], "release_date": "2022-01-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: possible privileges escalation due to missing TLB flush" }, { "cve": "CVE-2022-22942", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044809" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: failing usercopy allows for use-after-free exploitation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "RHBZ#2044809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942" } ], "release_date": "2022-01-27T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "workaround", "details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.59.1.rt56.1200.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.59.1.rt56.1200.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: failing usercopy allows for use-after-free exploitation" } ] }
rhsa-2022_1104
Vulnerability from csaf_redhat
Published
2022-03-29 08:55
Modified
2024-11-15 10:50
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1104", "url": "https://access.redhat.com/errata/RHSA-2022:1104" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "2029923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923" }, { "category": "external", "summary": "2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1104.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-15T10:50:40+00:00", "generator": { "date": "2024-11-15T10:50:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1104", "initial_release_date": "2022-03-29T08:55:12+00:00", "revision_history": [ { "date": "2022-03-29T08:55:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-29T08:55:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T10:50:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.99.1.el7.src", "product": { "name": "kernel-0:3.10.0-693.99.1.el7.src", "product_id": "kernel-0:3.10.0-693.99.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.99.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-693.99.1.el7.x86_64", "product_id": "perf-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-693.99.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.99.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.99.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.99.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-693.99.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-693.99.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-693.99.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.99.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.99.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.99.1.el7.src", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.99.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.99.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.99.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.99.1.el7.src", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.99.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.99.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-29T08:55:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1104" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031930" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "RHBZ#2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-29T08:55:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1104" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation" }, { "cve": "CVE-2021-4083", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-12-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2029923" } ], "notes": [ { "category": "description", "text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fget: check that the fd still exists after getting a ref to it", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4083" }, { "category": "external", "summary": "RHBZ#2029923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9" } ], "release_date": "2021-12-03T08:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-29T08:55:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1104" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: fget: check that the fd still exists after getting a ref to it" }, { "cve": "CVE-2022-0330", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2042404" } ], "notes": [ { "category": "description", "text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible privileges escalation due to missing TLB flush", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "RHBZ#2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12", "url": "https://www.openwall.com/lists/oss-security/2022/01/25/12" } ], "release_date": "2022-01-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-29T08:55:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1104" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.src", "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.99.1.el7.noarch", "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.99.1.el7.x86_64", "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.99.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: possible privileges escalation due to missing TLB flush" } ] }
rhsa-2021_2106
Vulnerability from csaf_redhat
Published
2021-05-25 16:00
Modified
2024-11-15 11:48
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)
* kernel: Use after free via PI futex state (CVE-2021-3347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930170)
* RHEL8.3 - Include patch: powerpc/pci: Remove LSI mappings on device teardown (xive/pci) (BZ#1931926)
* [HPEMC 8.1 REGRESSION] skx_uncore: probe of 0008:80:08.0 failed with error -22 (BZ#1947115)
* [Azure][RHEL-8]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1952072)
* [HPEMC 8.4 REGRESSION]: perf/x86/intel/uncore kernel panic vulnerability on Haswell and Broadwell servers (BZ#1956686)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930170)\n\n* RHEL8.3 - Include patch: powerpc/pci: Remove LSI mappings on device teardown (xive/pci) (BZ#1931926)\n\n* [HPEMC 8.1 REGRESSION] skx_uncore: probe of 0008:80:08.0 failed with error -22 (BZ#1947115)\n\n* [Azure][RHEL-8]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1952072)\n\n* [HPEMC 8.4 REGRESSION]: perf/x86/intel/uncore kernel panic vulnerability on Haswell and Broadwell servers (BZ#1956686)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2106", "url": "https://access.redhat.com/errata/RHSA-2021:2106" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "1922249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249" }, { "category": "external", "summary": "1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2106.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-15T11:48:37+00:00", "generator": { "date": "2024-11-15T11:48:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:2106", "initial_release_date": "2021-05-25T16:00:47+00:00", "revision_history": [ { "date": "2021-05-25T16:00:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-25T16:00:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:48:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "perf-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "perf-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.48.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "product": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "product_id": "python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.48.1.el8_1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "perf-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "perf-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.48.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "product": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "product_id": "python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.48.1.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "perf-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "perf-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.48.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "product": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "product_id": "python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.48.1.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "bpftool-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "perf-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "perf-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.48.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.48.1.el8_1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-147.48.1.el8_1.src", "product": { "name": "kernel-0:4.18.0-147.48.1.el8_1.src", "product_id": "kernel-0:4.18.0-147.48.1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.48.1.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.48.1.el8_1?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "product": { "name": "kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "product_id": "kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.48.1.el8_1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "bpftool-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.48.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src" }, "product_reference": "kernel-0:4.18.0-147.48.1.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.48.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "perf-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "perf-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "perf-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "perf-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "bpftool-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.48.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src" }, "product_reference": "kernel-0:4.18.0-147.48.1.el8_1.src", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.48.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "perf-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "perf-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "perf-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "perf-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-25T16:00:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:2106" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2020-12362", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930246" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12362" }, { "category": "external", "summary": "RHBZ#1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-25T16:00:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:2106" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-28374", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-11-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1899804" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: SCSI target (LIO) write to any block on ILO backstore", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "RHBZ#1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28374", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-25T16:00:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:2106" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: SCSI target (LIO) write to any block on ILO backstore" }, { "cve": "CVE-2021-3347", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1922249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use after free via PI futex state", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.48.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "RHBZ#1922249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347" } ], "release_date": "2021-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-25T16:00:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:2106" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.48.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.48.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.48.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Use after free via PI futex state" } ] }
rhsa-2022_0620
Vulnerability from csaf_redhat
Published
2022-02-22 17:14
Modified
2024-11-15 14:42
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)
* kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege (CVE-2020-0465)
* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)
* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Kernel with enabled BERT does not decode CPU fatal events correctly (BZ#1950302)
* RHEL 7.9 - Call trace seen during controller random reset on IB config (BZ#1984070)
* Infinite loop in blk_set_queue_dying() from blk_queue_for_each_rl() when another CPU races and modifies the queue's blkg_list (BZ#2029574)
* NFS client kernel crash in NFS4 backchannel transmit path - ftrace_raw_event_rpc_task_queued called from rpc_run_bc_task (BZ#2039508)
* SELinux is preventing / from mount access on the filesystem /proc (BZ#2040196)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\n* kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege (CVE-2020-0465)\n\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Kernel with enabled BERT does not decode CPU fatal events correctly (BZ#1950302)\n\n* RHEL 7.9 - Call trace seen during controller random reset on IB config (BZ#1984070)\n\n* Infinite loop in blk_set_queue_dying() from blk_queue_for_each_rl() when another CPU races and modifies the queue\u0027s blkg_list (BZ#2029574)\n\n* NFS client kernel crash in NFS4 backchannel transmit path - ftrace_raw_event_rpc_task_queued called from rpc_run_bc_task (BZ#2039508)\n\n* SELinux is preventing / from mount access on the filesystem /proc (BZ#2040196)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0620", "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1920471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920471" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "1999544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544" }, { "category": "external", "summary": "2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "2044809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0620.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-15T14:42:14+00:00", "generator": { "date": "2024-11-15T14:42:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:0620", "initial_release_date": "2022-02-22T17:14:18+00:00", "revision_history": [ { "date": "2022-02-22T17:14:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-22T17:14:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:42:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "bpftool-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "bpftool-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "perf-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.59.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.59.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-1160.59.1.el7.src", "product": { "name": "kernel-0:3.10.0-1160.59.1.el7.src", "product_id": "kernel-0:3.10.0-1160.59.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.59.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.59.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.59.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "perf-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.59.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.59.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "bpftool-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "perf-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.59.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.59.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "bpftool-0:3.10.0-1160.59.1.el7.s390x", "product_id": "bpftool-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "perf-0:3.10.0-1160.59.1.el7.s390x", "product_id": "perf-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-1160.59.1.el7.s390x", "product_id": "python-perf-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_id": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.59.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.59.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0465", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920471" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s multi-touch input system. An out-of-bounds write triggered by a use-after-free issue could lead to memory corruption or possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0465" }, { "category": "external", "summary": "RHBZ#1920471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920471" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0465" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:14:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "category": "workaround", "details": "As the multitouch module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install hid-multitouch /bin/true\" \u003e\u003e /etc/modprobe.d/disable-hid-multitouch.conf\n\nThe system may need to be restarted if the hid-multitouch module is loaded. In most circumstances, a kernel modules will be unable to be unloaded while in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege" }, { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:14:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031930" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "RHBZ#2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:14:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation" }, { "acknowledgments": [ { "names": [ "HaoXiong, LinMa" ], "organization": "ckSec" } ], "cve": "CVE-2021-3564", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2021-05-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964139" } ], "notes": [ { "category": "description", "text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3564" }, { "category": "external", "summary": "RHBZ#1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/25/1" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:14:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails" }, { "cve": "CVE-2021-3573", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966578" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function hci_sock_bound_ioctl()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3573" }, { "category": "external", "summary": "RHBZ#1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2", "url": "https://www.openwall.com/lists/oss-security/2021/06/08/2" } ], "release_date": "2021-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:14:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function hci_sock_bound_ioctl()" }, { "acknowledgments": [ { "names": [ "Likang Luo" ], "organization": "NSFOCUS Security Team" } ], "cve": "CVE-2021-3752", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999544" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible use-after-free in bluetooth module", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3752" }, { "category": "external", "summary": "RHBZ#1999544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/", "url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4", "url": "https://www.openwall.com/lists/oss-security/2021/09/15/4" } ], "release_date": "2021-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:14:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible use-after-free in bluetooth module" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ], "organization": "Virtuozzo Kernel team" } ], "cve": "CVE-2021-4155", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2021-12-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034813" } ], "notes": [ { "category": "description", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "RHBZ#2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" } ], "release_date": "2022-01-10T06:36:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:14:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "category": "workaround", "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL" }, { "cve": "CVE-2022-0330", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2042404" } ], "notes": [ { "category": "description", "text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible privileges escalation due to missing TLB flush", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "RHBZ#2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12", "url": "https://www.openwall.com/lists/oss-security/2022/01/25/12" } ], "release_date": "2022-01-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:14:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: possible privileges escalation due to missing TLB flush" }, { "cve": "CVE-2022-22942", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044809" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: failing usercopy allows for use-after-free exploitation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "RHBZ#2044809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942" } ], "release_date": "2022-01-27T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T17:14:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "category": "workaround", "details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.59.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.59.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.59.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: failing usercopy allows for use-after-free exploitation" } ] }
rhsa-2021_2190
Vulnerability from csaf_redhat
Published
2021-06-01 16:06
Modified
2024-11-15 08:43
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)
* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest RHEL-8.2.z9 Batch source tree (BZ#1949685)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\n* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z9 Batch source tree (BZ#1949685)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2190", "url": "https://access.redhat.com/errata/RHSA-2021:2190" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2190.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-15T08:43:01+00:00", "generator": { "date": "2024-11-15T08:43:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:2190", "initial_release_date": "2021-06-01T16:06:35+00:00", "revision_history": [ { "date": "2021-06-01T16:06:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-06-01T16:06:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:43:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "product": { "name": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "product_id": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.56.1.rt13.106.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.56.1.rt13.106.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T16:06:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2190" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2020-12114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848652" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS by corrupting mountpoint reference counter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "RHBZ#1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114" } ], "release_date": "2020-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T16:06:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2190" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS by corrupting mountpoint reference counter" }, { "cve": "CVE-2020-12362", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930246" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12362" }, { "category": "external", "summary": "RHBZ#1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T16:06:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2190" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-28374", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1899804" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: SCSI target (LIO) write to any block on ILO backstore", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "RHBZ#1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28374", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T16:06:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2190" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.56.1.rt13.106.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: SCSI target (LIO) write to any block on ILO backstore" } ] }
rhsa-2022_1417
Vulnerability from csaf_redhat
Published
2022-04-19 16:19
Modified
2024-11-15 14:46
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1417", "url": "https://access.redhat.com/errata/RHSA-2022:1417" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "2051505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1417.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-15T14:46:46+00:00", "generator": { "date": "2024-11-15T14:46:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1417", "initial_release_date": "2022-04-19T16:19:00+00:00", "revision_history": [ { "date": "2022-04-19T16:19:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-19T16:19:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:46:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.47.1.el6.src", "product": { "name": "kernel-0:2.6.32-754.47.1.el6.src", "product_id": "kernel-0:2.6.32-754.47.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.47.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-754.47.1.el6.x86_64", "product_id": "kernel-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-754.47.1.el6.x86_64", "product_id": "perf-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.47.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-754.47.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-754.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.47.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.47.1.el6.i686", "product": { "name": "kernel-0:2.6.32-754.47.1.el6.i686", "product_id": "kernel-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.47.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-754.47.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.47.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-754.47.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.47.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-754.47.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.47.1.el6.i686", "product": { "name": "perf-0:2.6.32-754.47.1.el6.i686", "product_id": "perf-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.47.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-754.47.1.el6.i686", "product_id": "python-perf-0:2.6.32-754.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.47.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "perf-0:2.6.32-754.47.1.el6.s390x", "product_id": "perf-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.47.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-754.47.1.el6.s390x", "product_id": "python-perf-0:2.6.32-754.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.47.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.47.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-754.47.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-754.47.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-754.47.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.47.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.47.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.47.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src" }, "product_reference": "kernel-0:2.6.32-754.47.1.el6.src", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.47.1.el6.noarch", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "perf-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.47.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src" }, "product_reference": "kernel-0:2.6.32-754.47.1.el6.src", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.47.1.el6.noarch", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "perf-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ], "known_not_affected": [ "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-19T16:19:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1417" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031930" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ], "known_not_affected": [ "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "RHBZ#2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-19T16:19:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1417" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ], "organization": "Virtuozzo Kernel team" } ], "cve": "CVE-2021-4155", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2021-12-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034813" } ], "notes": [ { "category": "description", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ], "known_not_affected": [ "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "RHBZ#2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" } ], "release_date": "2022-01-10T06:36:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-19T16:19:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1417" }, { "category": "workaround", "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL" }, { "acknowledgments": [ { "names": [ "Yiqi Sun" ], "organization": "Nebula Lab" }, { "names": [ "Kevin Wang" ], "organization": "Huawei" } ], "cve": "CVE-2022-0492", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2022-02-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2051505" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cgroups v1 release_agent feature may allow privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "In the OpenShift Container Platform (OCP) the container escape and privilege escalation caused by the CVE-2022-0492 vulnerability are blocked by the SELinux policy enabled (by default) on the OCP cluster nodes.\n\nRed Hat Virtualization requires SELinux running in enforcing mode[1] on all hypervisors and managers, which blocks this vulnerability.\n\n1. https://access.redhat.com/solutions/499473", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ], "known_not_affected": [ "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "RHBZ#2051505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051505" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0492", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0492" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af" } ], "release_date": "2022-02-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-19T16:19:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1417" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.47.1.el6.noarch", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.47.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.47.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cgroups v1 release_agent feature may allow privilege escalation" } ] }
rhsa-2022_0712
Vulnerability from csaf_redhat
Published
2022-03-01 12:52
Modified
2024-11-15 10:49
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0712", "url": "https://access.redhat.com/errata/RHSA-2022:0712" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0712.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-15T10:49:18+00:00", "generator": { "date": "2024-11-15T10:49:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:0712", "initial_release_date": "2022-03-01T12:52:46+00:00", "revision_history": [ { "date": "2022-03-01T12:52:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-01T12:52:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T10:49:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "bpftool-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "bpftool-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "perf-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.63.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.63.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-1062.63.1.el7.src", "product": { "name": "kernel-0:3.10.0-1062.63.1.el7.src", "product_id": "kernel-0:3.10.0-1062.63.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.63.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.63.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.63.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "perf-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.63.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.63.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.src", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.src", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.src", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-01T12:52:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0712" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ], "organization": "Virtuozzo Kernel team" } ], "cve": "CVE-2021-4155", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2021-12-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034813" } ], "notes": [ { "category": "description", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "RHBZ#2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" } ], "release_date": "2022-01-10T06:36:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-01T12:52:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0712" }, { "category": "workaround", "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441", "product_ids": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL" }, { "cve": "CVE-2022-0330", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2042404" } ], "notes": [ { "category": "description", "text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible privileges escalation due to missing TLB flush", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ], "known_not_affected": [ "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "RHBZ#2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12", "url": "https://www.openwall.com/lists/oss-security/2022/01/25/12" } ], "release_date": "2022-01-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-01T12:52:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:0712" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.ppc64le", "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.src", "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.63.1.el7.noarch", "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.63.1.el7.x86_64", "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.63.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: possible privileges escalation due to missing TLB flush" } ] }
rhsa-2021_2185
Vulnerability from csaf_redhat
Published
2021-06-02 00:52
Modified
2024-11-15 08:44
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)
* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RHEL8.3 - Include patch: powerpc/pci: Remove LSI mappings on device teardown (xive/pci) (BZ#1931925)
* RHEL8.2 - [P10][Denali] System crash during a perf sanity test (perf:) (BZ#1933995)
* [RHEL 8.1] AMD/EPYC nested guest virtualization L1 guest crash (BZ#1945404)
* [HPEMC 8.1 REGRESSION] skx_uncore: probe of 0008:80:08.0 failed with error -22 (BZ#1947114)
* iperf3 over geneve created on vlan would fail (BZ#1947979)
* [Azure][RHEL-8]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1952071)
* [HPEMC 8.4 REGRESSION]: perf/x86/intel/uncore kernel panic vulnerability on Haswell and Broadwell servers (BZ#1956685)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\n* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL8.3 - Include patch: powerpc/pci: Remove LSI mappings on device teardown (xive/pci) (BZ#1931925)\n\n* RHEL8.2 - [P10][Denali] System crash during a perf sanity test (perf:) (BZ#1933995)\n\n* [RHEL 8.1] AMD/EPYC nested guest virtualization L1 guest crash (BZ#1945404)\n\n* [HPEMC 8.1 REGRESSION] skx_uncore: probe of 0008:80:08.0 failed with error -22 (BZ#1947114)\n\n* iperf3 over geneve created on vlan would fail (BZ#1947979)\n\n* [Azure][RHEL-8]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1952071)\n\n* [HPEMC 8.4 REGRESSION]: perf/x86/intel/uncore kernel panic vulnerability on Haswell and Broadwell servers (BZ#1956685)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2185", "url": "https://access.redhat.com/errata/RHSA-2021:2185" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2185.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-15T08:44:15+00:00", "generator": { "date": "2024-11-15T08:44:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:2185", "initial_release_date": "2021-06-02T00:52:30+00:00", "revision_history": [ { "date": "2021-06-02T00:52:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-06-02T00:52:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:44:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "perf-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "perf-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.56.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.56.1.el8_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "perf-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "perf-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.56.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.56.1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "perf-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "perf-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.56.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.56.1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "bpftool-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "perf-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "perf-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.56.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.56.1.el8_2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-193.56.1.el8_2.src", "product": { "name": "kernel-0:4.18.0-193.56.1.el8_2.src", "product_id": "kernel-0:4.18.0-193.56.1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.56.1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.56.1.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "product_id": "kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.56.1.el8_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "bpftool-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.56.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.56.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.56.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "perf-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "perf-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "bpftool-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.56.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.56.1.el8_2.src", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.56.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "perf-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "perf-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-02T00:52:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:2185" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2020-12114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-05-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848652" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS by corrupting mountpoint reference counter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "RHBZ#1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114" } ], "release_date": "2020-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-02T00:52:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:2185" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS by corrupting mountpoint reference counter" }, { "cve": "CVE-2020-12362", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930246" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12362" }, { "category": "external", "summary": "RHBZ#1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-02T00:52:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:2185" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-28374", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-11-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1899804" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: SCSI target (LIO) write to any block on ILO backstore", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.56.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "RHBZ#1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28374", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-02T00:52:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:2185" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.56.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.56.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.56.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: SCSI target (LIO) write to any block on ILO backstore" } ] }
rhsa-2021_1081
Vulnerability from csaf_redhat
Published
2021-04-06 15:32
Modified
2024-11-15 11:46
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)
* kernel: Use after free via PI futex state (CVE-2021-3347)
* kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708)
* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)
* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)
* Kernel: KVM: host stack overflow due to lazy update IOAPIC (CVE-2020-27152)
* kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt possible livelock: WARNING: CPU: 28 PID: 3109 at kernel/ptrace.c:242 ptrace_check_attach+0xdd/0x1a0 (BZ#1925308)
* kernel-rt: update RT source tree to the RHEL-8.3.z3 source tree (BZ#1926369)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708)\n\n* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)\n\n* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)\n\n* Kernel: KVM: host stack overflow due to lazy update IOAPIC (CVE-2020-27152)\n\n* kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt possible livelock: WARNING: CPU: 28 PID: 3109 at kernel/ptrace.c:242 ptrace_check_attach+0xdd/0x1a0 (BZ#1925308)\n\n* kernel-rt: update RT source tree to the RHEL-8.3.z3 source tree (BZ#1926369)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1081", "url": "https://access.redhat.com/errata/RHSA-2021:1081" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1888886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888886" }, { "category": "external", "summary": "1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "1922249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249" }, { "category": "external", "summary": "1925588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925588" }, { "category": "external", "summary": "1926369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926369" }, { "category": "external", "summary": "1930078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930078" }, { "category": "external", "summary": "1930079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930079" }, { "category": "external", "summary": "1930080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930080" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1081.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-15T11:46:37+00:00", "generator": { "date": "2024-11-15T11:46:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1081", "initial_release_date": "2021-04-06T15:32:35+00:00", "revision_history": [ { "date": "2021-04-06T15:32:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-06T15:32:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:46:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "product": { "name": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "product_id": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-240.22.1.rt7.77.el8_3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-240.22.1.rt7.77.el8_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src" }, "product_reference": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "NFV-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src" }, "product_reference": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "relates_to_product_reference": "RT-8.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T15:32:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1081" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2020-27152", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1888886" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw via an infinite loop condition issue was found in the KVM hypervisor of the Linux kernel. This flaw occurs while processing interrupts because the IRQ state is erroneously set. This flaw allows a guest user to crash the host kernel, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: host stack overflow due to lazy update IOAPIC", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 8. Future kernel updates for Red Hat Enterprise Linux 8 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27152" }, { "category": "external", "summary": "RHBZ#1888886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27152", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27152" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27152", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27152" }, { "category": "external", "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=208767", "url": "https://bugzilla.kernel.org/show_bug.cgi?id=208767" }, { "category": "external", "summary": "https://git.kernel.org/linus/77377064c3a94911339f13ce113b3abf265e06da", "url": "https://git.kernel.org/linus/77377064c3a94911339f13ce113b3abf265e06da" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/03/1", "url": "https://www.openwall.com/lists/oss-security/2020/11/03/1" } ], "release_date": "2020-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T15:32:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1081" }, { "category": "workaround", "details": "Disabling APICV by setting the kvm_intel.enable_apicv=0 parameter helps to avoid this situation.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: KVM: host stack overflow due to lazy update IOAPIC" }, { "cve": "CVE-2020-28374", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1899804" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: SCSI target (LIO) write to any block on ILO backstore", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "RHBZ#1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28374", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T15:32:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1081" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: SCSI target (LIO) write to any block on ILO backstore" }, { "cve": "CVE-2021-3347", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1922249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use after free via PI futex state", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "RHBZ#1922249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347" } ], "release_date": "2021-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T15:32:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1081" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Use after free via PI futex state" }, { "acknowledgments": [ { "names": [ "Alexander Popov" ] } ], "cve": "CVE-2021-26708", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925588" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Wrong locking in the AF_VSOCK socket can cause a local privilege escalation, bypassing SMEP and SMAP. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does affect the Red Hat Enterprise Linux 8 kernel versions kernel-4.18.0-240 onwards, starting with Red Hat Enterprise Linux 8.3 GA, which introduced VSOCK multi-transport support. Prior Red Hat Enterprise Linux kernel versions are not affected by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "RHBZ#1925588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925588" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26708", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26708" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26708", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26708" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/02/04/5", "url": "https://www.openwall.com/lists/oss-security/2021/02/04/5" } ], "release_date": "2021-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T15:32:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1081" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c" }, { "acknowledgments": [ { "names": [ "Adam Nichols" ], "organization": "GRIMM" } ], "cve": "CVE-2021-27363", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930079" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way access to sessions and handles was handled in the iSCSI driver in the Linux kernel. A local user could use this flaw to leak iSCSI transport handle kernel address or end arbitrary iSCSI connections on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: iscsi: unrestricted access to sessions and handles", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27363" }, { "category": "external", "summary": "RHBZ#1930079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930079" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27363", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27363" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/03/06/1", "url": "https://www.openwall.com/lists/oss-security/2021/03/06/1" } ], "release_date": "2021-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T15:32:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1081" }, { "category": "workaround", "details": "The LIBISCSI module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install libiscsi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-libiscsi.conf\n\nThe system will need to be restarted if the libiscsi modules are loaded. In most circumstances, the libiscsi kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires iscsi to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: iscsi: unrestricted access to sessions and handles" }, { "acknowledgments": [ { "names": [ "Adam Nichols" ], "organization": "GRIMM" } ], "cve": "CVE-2021-27364", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930080" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An out-of-bounds read was discovered in the libiscsi module that could lead to reading kernel memory or a crash. The highest threat from this vulnerability is to data confidentiality as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds read in libiscsi module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27364" }, { "category": "external", "summary": "RHBZ#1930080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930080" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27364", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27364" } ], "release_date": "2021-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T15:32:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1081" }, { "category": "workaround", "details": "The LIBISCSI module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install libiscsi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-libiscsi.conf\n\nThe system will need to be restarted if the libiscsi modules are loaded. In most circumstances, the libiscsi kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires iscsi to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: out-of-bounds read in libiscsi module" }, { "acknowledgments": [ { "names": [ "Adam Nichols" ], "organization": "GRIMM" } ], "cve": "CVE-2021-27365", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930078" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A heap buffer overflow in the iSCSI subsystem is triggered by setting an iSCSI string attribute to a value larger than one page and then trying to read it. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap buffer overflow in the iSCSI subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27365" }, { "category": "external", "summary": "RHBZ#1930078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27365", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27365", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27365" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/03/06/1", "url": "https://www.openwall.com/lists/oss-security/2021/03/06/1" } ], "release_date": "2021-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T15:32:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1081" }, { "category": "workaround", "details": "The LIBISCSI module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n~~~\n# echo \"install libiscsi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-libiscsi.conf\n~~~\nThe system will need to be restarted if the libiscsi modules are loaded. In most circumstances, the libiscsi kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires iscsi to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "NFV-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "NFV-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.src", "RT-8.3.0.Z.MAIN:kernel-rt-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-core-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debug-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-devel-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-kvm-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64", "RT-8.3.0.Z.MAIN:kernel-rt-modules-extra-0:4.18.0-240.22.1.rt7.77.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap buffer overflow in the iSCSI subsystem" } ] }
rhsa-2022_0592
Vulnerability from csaf_redhat
Published
2022-02-22 09:17
Modified
2024-11-15 14:42
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0592", "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "2044809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0592.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-15T14:42:06+00:00", "generator": { "date": "2024-11-15T14:42:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:0592", "initial_release_date": "2022-02-22T09:17:36+00:00", "revision_history": [ { "date": "2022-02-22T09:17:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-22T09:17:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:42:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "product": { "name": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-9.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "product": { "name": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-7.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "product": { "name": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-7.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "product": { "name": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-6.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "product": { "name": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-5.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "product": { "name": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-4.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "product": { "name": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-3.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "product": { "name": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-2.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-1.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-9.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-9.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1-debuginfo@1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1-debuginfo@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1-debuginfo@1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-9.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-9.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1@1-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_41_1-debuginfo@1-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2@1-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_42_2-debuginfo@1-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1@1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_45_1-debuginfo@1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_49_1-debuginfo@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_53_1-debuginfo@1-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T09:17:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031930" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "RHBZ#2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T09:17:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ], "organization": "Virtuozzo Kernel team" } ], "cve": "CVE-2021-4155", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2021-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034813" } ], "notes": [ { "category": "description", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "RHBZ#2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" } ], "release_date": "2022-01-10T06:36:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T09:17:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "category": "workaround", "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441", "product_ids": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL" }, { "cve": "CVE-2022-0330", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2022-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2042404" } ], "notes": [ { "category": "description", "text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible privileges escalation due to missing TLB flush", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "RHBZ#2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12", "url": "https://www.openwall.com/lists/oss-security/2022/01/25/12" } ], "release_date": "2022-01-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T09:17:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: possible privileges escalation due to missing TLB flush" }, { "cve": "CVE-2022-22942", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044809" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: failing usercopy allows for use-after-free exploitation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "RHBZ#2044809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942" } ], "release_date": "2022-01-27T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-22T09:17:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "category": "workaround", "details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~", "product_ids": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-9.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-6.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-5.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_41_1-debuginfo-0:1-4.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_42_2-debuginfo-0:1-3.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_45_1-debuginfo-0:1-2.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_49_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.src", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-0:1-1.el7.x86_64", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.9.Z:kpatch-patch-3_10_0-1160_53_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: failing usercopy allows for use-after-free exploitation" } ] }
rhsa-2022_0718
Vulnerability from csaf_redhat
Published
2022-03-01 12:53
Modified
2024-11-15 10:48
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0718", "url": "https://access.redhat.com/errata/RHSA-2022:0718" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0718.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-15T10:48:08+00:00", "generator": { "date": "2024-11-15T10:48:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:0718", "initial_release_date": "2022-03-01T12:53:21+00:00", "revision_history": [ { "date": "2022-03-01T12:53:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-01T12:53:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T10:48:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "product": { "name": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-7.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "product": { "name": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-5.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "product": { "name": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-5.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "product": { "name": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-4.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "product": { "name": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-3.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-1.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-1.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1-debuginfo@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1-debuginfo@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1-debuginfo@1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1@1-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_56_1-debuginfo@1-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_59_1-debuginfo@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_60_1-debuginfo@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_61_1-debuginfo@1-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-01T12:53:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0718" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ], "organization": "Virtuozzo Kernel team" } ], "cve": "CVE-2021-4155", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2021-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034813" } ], "notes": [ { "category": "description", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "RHBZ#2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" } ], "release_date": "2022-01-10T06:36:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-01T12:53:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0718" }, { "category": "workaround", "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441", "product_ids": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL" }, { "cve": "CVE-2022-0330", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2022-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2042404" } ], "notes": [ { "category": "description", "text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible privileges escalation due to missing TLB flush", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "RHBZ#2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12", "url": "https://www.openwall.com/lists/oss-security/2022/01/25/12" } ], "release_date": "2022-01-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-01T12:53:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0718" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-7.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-5.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-4.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_56_1-debuginfo-0:1-3.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_59_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_60_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.src", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-0:1-1.el7.x86_64", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_61_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: possible privileges escalation due to missing TLB flush" } ] }
rhsa-2021_1093
Vulnerability from csaf_redhat
Published
2021-04-06 17:15
Modified
2024-11-15 11:46
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)
* kernel: Use after free via PI futex state (CVE-2021-3347)
* kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708)
* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)
* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)
* Kernel: KVM: host stack overflow due to lazy update IOAPIC (CVE-2020-27152)
* kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* race condition when creating child sockets from syncookies (BZ#1915529)
* On System Z, a hash needs state randomized for entropy extraction (BZ#1915816)
* scsi: target: core_tmr_abort_task() reporting multiple aborts for the same se_cmd->tag (BZ#1918354)
* [mlx5] VF interface stats are not reflected in "ip -s link show" / "ifconfig <vf>" commands (BZ#1921060)
* Win10 guest automatic reboot after migration in Win10 and WSL2 on Intel hosts (BZ#1923281)
* [RHEL 8.3] Repeated messages - Unable to burst-read optrom segment (BZ#1924222)
* Backport bug fix RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz (BZ#1924691)
* [Cisco 8.3] RHEL/Cent 8.2 fNIC driver needs a patch fix that addresses crash (BZ#1925186)
* RHEL8.3 - The kernel misdetects zCX with z/VM (BZ#1925508)
* Backport 22e4663e91 ("mm/slub: fix panic in slab_alloc_node()") (BZ#1925511)
* SCTP "Address already in use" when no active endpoints from RHEL 8.2 onwards (BZ#1927521)
* lpfc: Fix initial FLOGI failure due to BBSCN not supported (BZ#1927921)
* [mm] mm, oom: remove oom_lock from oom_reaper (BZ#1929738)
* Unexpected thread movement with AMD Milan compared to Rome (BZ#1929740)
* rpmbuild cannot build the userspace RPMs in the kernel package when the kernel itself is not built (BZ#1929910)
* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930168)
* Configuring the system with non-RT kernel will hang the system (BZ#1930735)
* Upstream Patch for Gracefully handle DMAR units with no supported address widthsx86/vt-d (BZ#1932199)
* gfs2: Deadlock between gfs2_{create_inode,inode_lookup} and delete_work_func (BZ#1937109)
* Failing on tsx-ctrl when the flag doesn't change anything (BZ#1939013)
Enhancement(s):
* RFE: Backport all Audit enhancements and fixes up to version 5.10-rc1 (BZ#1907520)
* RHEL8.4: Update the target driver (BZ#1918363)
* [Mellanox 8.4 FEAT] mlx5: Hairpin Support in Switch Mode (BZ#1924689)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708)\n\n* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)\n\n* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)\n\n* Kernel: KVM: host stack overflow due to lazy update IOAPIC (CVE-2020-27152)\n\n* kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* race condition when creating child sockets from syncookies (BZ#1915529)\n\n* On System Z, a hash needs state randomized for entropy extraction (BZ#1915816)\n\n* scsi: target: core_tmr_abort_task() reporting multiple aborts for the same se_cmd-\u003etag (BZ#1918354)\n\n* [mlx5] VF interface stats are not reflected in \"ip -s link show\" / \"ifconfig \u003cvf\u003e\" commands (BZ#1921060)\n\n* Win10 guest automatic reboot after migration in Win10 and WSL2 on Intel hosts (BZ#1923281)\n\n* [RHEL 8.3] Repeated messages - Unable to burst-read optrom segment (BZ#1924222)\n\n* Backport bug fix RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz (BZ#1924691)\n\n* [Cisco 8.3] RHEL/Cent 8.2 fNIC driver needs a patch fix that addresses crash (BZ#1925186)\n\n* RHEL8.3 - The kernel misdetects zCX with z/VM (BZ#1925508)\n\n* Backport 22e4663e91 (\"mm/slub: fix panic in slab_alloc_node()\") (BZ#1925511)\n\n* SCTP \"Address already in use\" when no active endpoints from RHEL 8.2 onwards (BZ#1927521)\n\n* lpfc: Fix initial FLOGI failure due to BBSCN not supported (BZ#1927921)\n\n* [mm] mm, oom: remove oom_lock from oom_reaper (BZ#1929738)\n\n* Unexpected thread movement with AMD Milan compared to Rome (BZ#1929740)\n\n* rpmbuild cannot build the userspace RPMs in the kernel package when the kernel itself is not built (BZ#1929910)\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930168)\n\n* Configuring the system with non-RT kernel will hang the system (BZ#1930735)\n\n* Upstream Patch for Gracefully handle DMAR units with no supported address widthsx86/vt-d (BZ#1932199)\n\n* gfs2: Deadlock between gfs2_{create_inode,inode_lookup} and delete_work_func (BZ#1937109)\n\n* Failing on tsx-ctrl when the flag doesn\u0027t change anything (BZ#1939013)\n\nEnhancement(s):\n\n* RFE: Backport all Audit enhancements and fixes up to version 5.10-rc1 (BZ#1907520)\n\n* RHEL8.4: Update the target driver (BZ#1918363)\n\n* [Mellanox 8.4 FEAT] mlx5: Hairpin Support in Switch Mode (BZ#1924689)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1093", "url": "https://access.redhat.com/errata/RHSA-2021:1093" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1888886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888886" }, { "category": "external", "summary": "1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "1922249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249" }, { "category": "external", "summary": "1925588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925588" }, { "category": "external", "summary": "1930078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930078" }, { "category": "external", "summary": "1930079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930079" }, { "category": "external", "summary": "1930080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930080" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1093.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-15T11:46:44+00:00", "generator": { "date": "2024-11-15T11:46:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1093", "initial_release_date": "2021-04-06T17:15:40+00:00", "revision_history": [ { "date": "2021-04-06T17:15:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-06T17:15:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:46:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "perf-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "perf-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.22.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.22.1.el8_3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "perf-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "perf-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.22.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.22.1.el8_3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "perf-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "perf-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.22.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.22.1.el8_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "bpftool-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "perf-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "perf-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.22.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.22.1.el8_3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-240.22.1.el8_3.src", "product": { "name": "kernel-0:4.18.0-240.22.1.el8_3.src", "product_id": "kernel-0:4.18.0-240.22.1.el8_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.22.1.el8_3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-240.22.1.el8_3?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "product": { "name": "kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "product_id": "kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-240.22.1.el8_3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "bpftool-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.22.1.el8_3.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src" }, "product_reference": "kernel-0:4.18.0-240.22.1.el8_3.src", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-240.22.1.el8_3.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch" }, "product_reference": "kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "perf-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "perf-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "perf-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "perf-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "bpftool-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.22.1.el8_3.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src" }, "product_reference": "kernel-0:4.18.0-240.22.1.el8_3.src", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-240.22.1.el8_3.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch" }, "product_reference": "kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "perf-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "perf-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "perf-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "perf-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T17:15:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1093" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2020-27152", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-10-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1888886" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw via an infinite loop condition issue was found in the KVM hypervisor of the Linux kernel. This flaw occurs while processing interrupts because the IRQ state is erroneously set. This flaw allows a guest user to crash the host kernel, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: host stack overflow due to lazy update IOAPIC", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 8. Future kernel updates for Red Hat Enterprise Linux 8 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27152" }, { "category": "external", "summary": "RHBZ#1888886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27152", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27152" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27152", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27152" }, { "category": "external", "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=208767", "url": "https://bugzilla.kernel.org/show_bug.cgi?id=208767" }, { "category": "external", "summary": "https://git.kernel.org/linus/77377064c3a94911339f13ce113b3abf265e06da", "url": "https://git.kernel.org/linus/77377064c3a94911339f13ce113b3abf265e06da" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/03/1", "url": "https://www.openwall.com/lists/oss-security/2020/11/03/1" } ], "release_date": "2020-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T17:15:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1093" }, { "category": "workaround", "details": "Disabling APICV by setting the kvm_intel.enable_apicv=0 parameter helps to avoid this situation.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: KVM: host stack overflow due to lazy update IOAPIC" }, { "cve": "CVE-2020-28374", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-11-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1899804" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: SCSI target (LIO) write to any block on ILO backstore", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "RHBZ#1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28374", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T17:15:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1093" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: SCSI target (LIO) write to any block on ILO backstore" }, { "cve": "CVE-2021-3347", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1922249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use after free via PI futex state", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "RHBZ#1922249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347" } ], "release_date": "2021-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T17:15:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1093" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Use after free via PI futex state" }, { "acknowledgments": [ { "names": [ "Alexander Popov" ] } ], "cve": "CVE-2021-26708", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925588" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Wrong locking in the AF_VSOCK socket can cause a local privilege escalation, bypassing SMEP and SMAP. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does affect the Red Hat Enterprise Linux 8 kernel versions kernel-4.18.0-240 onwards, starting with Red Hat Enterprise Linux 8.3 GA, which introduced VSOCK multi-transport support. Prior Red Hat Enterprise Linux kernel versions are not affected by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "RHBZ#1925588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925588" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26708", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26708" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26708", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26708" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/02/04/5", "url": "https://www.openwall.com/lists/oss-security/2021/02/04/5" } ], "release_date": "2021-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T17:15:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1093" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c" }, { "acknowledgments": [ { "names": [ "Adam Nichols" ], "organization": "GRIMM" } ], "cve": "CVE-2021-27363", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-02-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930079" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way access to sessions and handles was handled in the iSCSI driver in the Linux kernel. A local user could use this flaw to leak iSCSI transport handle kernel address or end arbitrary iSCSI connections on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: iscsi: unrestricted access to sessions and handles", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27363" }, { "category": "external", "summary": "RHBZ#1930079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930079" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27363", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27363" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/03/06/1", "url": "https://www.openwall.com/lists/oss-security/2021/03/06/1" } ], "release_date": "2021-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T17:15:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1093" }, { "category": "workaround", "details": "The LIBISCSI module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install libiscsi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-libiscsi.conf\n\nThe system will need to be restarted if the libiscsi modules are loaded. In most circumstances, the libiscsi kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires iscsi to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: iscsi: unrestricted access to sessions and handles" }, { "acknowledgments": [ { "names": [ "Adam Nichols" ], "organization": "GRIMM" } ], "cve": "CVE-2021-27364", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-02-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930080" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An out-of-bounds read was discovered in the libiscsi module that could lead to reading kernel memory or a crash. The highest threat from this vulnerability is to data confidentiality as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds read in libiscsi module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27364" }, { "category": "external", "summary": "RHBZ#1930080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930080" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27364", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27364" } ], "release_date": "2021-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T17:15:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1093" }, { "category": "workaround", "details": "The LIBISCSI module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install libiscsi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-libiscsi.conf\n\nThe system will need to be restarted if the libiscsi modules are loaded. In most circumstances, the libiscsi kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires iscsi to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: out-of-bounds read in libiscsi module" }, { "acknowledgments": [ { "names": [ "Adam Nichols" ], "organization": "GRIMM" } ], "cve": "CVE-2021-27365", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2021-02-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930078" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A heap buffer overflow in the iSCSI subsystem is triggered by setting an iSCSI string attribute to a value larger than one page and then trying to read it. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap buffer overflow in the iSCSI subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27365" }, { "category": "external", "summary": "RHBZ#1930078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27365", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27365", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27365" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/03/06/1", "url": "https://www.openwall.com/lists/oss-security/2021/03/06/1" } ], "release_date": "2021-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-06T17:15:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1093" }, { "category": "workaround", "details": "The LIBISCSI module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n~~~\n# echo \"install libiscsi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-libiscsi.conf\n~~~\nThe system will need to be restarted if the libiscsi modules are loaded. In most circumstances, the libiscsi kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires iscsi to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.22.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.22.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.22.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap buffer overflow in the iSCSI subsystem" } ] }
rhsa-2021_2099
Vulnerability from csaf_redhat
Published
2021-05-25 06:49
Modified
2024-11-15 11:48
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)
* kernel: Use after free via PI futex state (CVE-2021-3347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2099", "url": "https://access.redhat.com/errata/RHSA-2021:2099" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "1922249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2099.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-15T11:48:30+00:00", "generator": { "date": "2024-11-15T11:48:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:2099", "initial_release_date": "2021-05-25T06:49:12+00:00", "revision_history": [ { "date": "2021-05-25T06:49:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-25T06:49:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:48:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1@1-11.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-9.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-9.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-7.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-7.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-6.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-4.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-3.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1@1-11.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1-debugsource@1-11.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1-debuginfo@1-11.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-9.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debugsource@1-9.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debuginfo@1-9.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-9.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-9.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-9.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-7.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-7.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-7.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-7.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-7.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-7.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-6.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-6.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-6.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-3.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1@1-11.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1-debugsource@1-11.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1-debuginfo@1-11.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-9.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debugsource@1-9.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debuginfo@1-9.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-9.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-9.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-9.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-7.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-7.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-7.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-7.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-7.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-7.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-6.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-6.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-6.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-3.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-25T06:49:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2099" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2020-28374", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1899804" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: SCSI target (LIO) write to any block on ILO backstore", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "RHBZ#1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28374", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-25T06:49:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2099" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: SCSI target (LIO) write to any block on ILO backstore" }, { "cve": "CVE-2021-3347", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1922249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use after free via PI futex state", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "RHBZ#1922249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347" } ], "release_date": "2021-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-25T06:49:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2099" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-11.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-9.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-6.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-3.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Use after free via PI futex state" } ] }
rhsa-2021_2167
Vulnerability from csaf_redhat
Published
2021-06-01 09:45
Modified
2024-11-15 08:44
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2167", "url": "https://access.redhat.com/errata/RHSA-2021:2167" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2167.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-15T08:44:01+00:00", "generator": { "date": "2024-11-15T08:44:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:2167", "initial_release_date": "2021-06-01T09:45:09+00:00", "revision_history": [ { "date": "2021-06-01T09:45:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-06-01T09:45:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:44:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3@1-11.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-9.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-9.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-9.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-7.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-7.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-7.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-7.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-7.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-4.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-4.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3@1-11.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3-debugsource@1-11.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3-debuginfo@1-11.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-9.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debugsource@1-9.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debuginfo@1-9.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-9.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debugsource@1-9.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debuginfo@1-9.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-9.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-9.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-9.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3@1-11.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3-debugsource@1-11.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3-debuginfo@1-11.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-9.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debugsource@1-9.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debuginfo@1-9.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-9.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debugsource@1-9.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debuginfo@1-9.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-9.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-9.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-9.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0466", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920480" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in eventpoll.c can cause a use-after-free, leading to a local escalation of privilege with no additional execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in eventpoll.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "RHBZ#1920480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T09:45:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2167" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use after free in eventpoll.c may lead to escalation of privilege" }, { "cve": "CVE-2020-28374", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1899804" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Linux SCSI target host, where an authenticated attacker could write to any block on the exported SCSI device backing store. This flaw allows an authenticated attacker to send LIO block requests to the Linux system to overwrite data on the backing store. The highest threat from this vulnerability is to integrity. In addition, this flaw affects the tcmu-runner package, where the affected SCSI command is called.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: SCSI target (LIO) write to any block on ILO backstore", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "RHBZ#1899804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28374", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T09:45:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2167" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-9.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-11.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-11.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: SCSI target (LIO) write to any block on ILO backstore" } ] }
ghsa-4pj4-7m9h-v9gf
Vulnerability from github
Published
2022-05-24 17:36
Modified
2022-05-24 17:36
Details
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel
{ "affected": [], "aliases": [ "CVE-2020-0466" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-12-14T22:15:00Z", "severity": "HIGH" }, "details": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "id": "GHSA-4pj4-7m9h-v9gf", "modified": "2022-05-24T17:36:15Z", "published": "2022-05-24T17:36:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0466" }, { "type": "WEB", "url": "https://source.android.com/security/bulletin/2020-12-01" } ], "schema_version": "1.4.0", "severity": [] }
wid-sec-w-2022-2387
Vulnerability from csaf_certbund
Published
2020-12-15 23:00
Modified
2023-05-30 22:00
Summary
Google Android Patchday Dezember 2020
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erhöhen, einen Denial of Service Zustand herbeizuführen oder Informationen offenzulegen.
Betroffene Betriebssysteme
- Android
- Blackberry
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das Android Betriebssystem von Google ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erh\u00f6hen, einen Denial of Service Zustand herbeizuf\u00fchren oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Android\n- Blackberry", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2387 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-2387.json" }, { "category": "self", "summary": "WID-SEC-2022-2387 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2387" }, { "category": "external", "summary": "IBM Security Bulletin 6999317 vom 2023-05-30", "url": "https://www.ibm.com/support/pages/node/6999317" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2314-1 vom 2023-05-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/015022.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2021-026 vom 2021-05-07", "url": "https://downloads.avaya.com/css/P8/documents/101075693" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:1093 vom 2021-04-06", "url": "https://access.redhat.com/errata/RHSA-2021:1093" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-1093 vom 2021-04-07", "url": "http://linux.oracle.com/errata/ELSA-2021-1093.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9164 vom 2021-04-09", "url": "http://linux.oracle.com/errata/ELSA-2021-9164.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:2099 vom 2021-05-25", "url": "https://access.redhat.com/errata/RHSA-2021:2099" }, { "category": "external", "summary": "Android Security Bulletin Dezember 2020 vom 2020-12-15", "url": "https://source.android.com/security/bulletin/2020-12-01" }, { "category": "external", "summary": "Pixel Update Bulletin - Dezember 2020", "url": "https://source.android.com/security/bulletin/pixel/2020-12-01" }, { "category": "external", "summary": "BlackBerry Powered by Android Security Bulletin - December 2020", "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000072551" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3933-1 vom 2020-12-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:2106 vom 2021-05-25", "url": "https://access.redhat.com/errata/RHSA-2021:2106" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0452-1 vom 2021-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0686 vom 2021-03-02", "url": "https://access.redhat.com/errata/RHSA-2021:0686" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0689 vom 2021-03-02", "url": "https://access.redhat.com/errata/RHSA-2021:0689" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0763 vom 2021-03-09", "url": "https://access.redhat.com/errata/RHSA-2021:0763" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0774 vom 2021-03-09", "url": "https://access.redhat.com/errata/RHSA-2021:0774" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0765 vom 2021-03-09", "url": "https://access.redhat.com/errata/RHSA-2021:0765" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0529 vom 2022-02-15", "url": "https://access.redhat.com/errata/RHSA-2022:0529" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0533 vom 2022-02-15", "url": "https://access.redhat.com/errata/RHSA-2022:0533" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0531 vom 2022-02-15", "url": "https://access.redhat.com/errata/RHSA-2022:0531" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0592 vom 2022-02-22", "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0622 vom 2022-02-22", "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-026 vom 2022-02-25", "url": "https://downloads.avaya.com/css/P8/documents/101080640" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0712 vom 2022-03-01", "url": "https://access.redhat.com/errata/RHSA-2022:0712" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0718 vom 2022-03-01", "url": "https://access.redhat.com/errata/RHSA-2022:0718" } ], "source_lang": "en-US", "title": "Google Android Patchday Dezember 2020", "tracking": { "current_release_date": "2023-05-30T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:07:42.540+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-2387", "initial_release_date": "2020-12-15T23:00:00.000+00:00", "revision_history": [ { "date": "2020-12-15T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-12-22T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von BlackBerry aufgenommen" }, { "date": "2020-12-27T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-02-14T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-03-01T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-03-08T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-04-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-04-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-04-08T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-05-09T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2021-05-24T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-05-25T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-15T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-22T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-27T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-03-01T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-21T23:00:00.000+00:00", "number": "17", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-05-30T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE und IBM aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Google Android 8.0", "product": { "name": "Google Android 8.0", "product_id": "344177", "product_identification_helper": { "cpe": "cpe:/o:google:android:8.0" } } }, { "category": "product_name", "name": "Google Android 8.1", "product": { "name": "Google Android 8.1", "product_id": "407131", "product_identification_helper": { "cpe": "cpe:/o:google:android:8.1" } } }, { "category": "product_name", "name": "Google Android 10", "product": { "name": "Google Android 10", "product_id": "560061", "product_identification_helper": { "cpe": "cpe:/o:google:android:10.0" } } }, { "category": "product_name", "name": "Google Android 9", "product": { "name": "Google Android 9", "product_id": "T012696", "product_identification_helper": { "cpe": "cpe:/o:google:android:9" } } }, { "category": "product_name", "name": "Google Android 11", "product": { "name": "Google Android 11", "product_id": "T017166", "product_identification_helper": { "cpe": "cpe:/o:google:android:11" } } } ], "category": "product_name", "name": "Android" } ], "category": "vendor", "name": "Google" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Security Guardium 11.4", "product": { "name": "IBM Security Guardium 11.4", "product_id": "1076561", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.4" } } }, { "category": "product_name", "name": "IBM Security Guardium 11.5", "product": { "name": "IBM Security Guardium 11.5", "product_id": "T026399", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.5" } } } ], "category": "product_name", "name": "Security Guardium" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "BlackBerry BlackBerry", "product": { "name": "BlackBerry BlackBerry", "product_id": "1321", "product_identification_helper": { "cpe": "cpe:/h:rim:blackberry:-" } } } ], "category": "vendor", "name": "rim" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16862", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2018-16862" }, { "cve": "CVE-2019-19535", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2019-19535" }, { "cve": "CVE-2019-20812", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2019-20812" }, { "cve": "CVE-2020-0016", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0016" }, { "cve": "CVE-2020-0019", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0019" }, { "cve": "CVE-2020-0099", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0099" }, { "cve": "CVE-2020-0202", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0202" }, { "cve": "CVE-2020-0244", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0244" }, { "cve": "CVE-2020-0280", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0280" }, { "cve": "CVE-2020-0294", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0294" }, { "cve": "CVE-2020-0368", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0368" }, { "cve": "CVE-2020-0440", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0440" }, { "cve": "CVE-2020-0444", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0444" }, { "cve": "CVE-2020-0455", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0455" }, { "cve": "CVE-2020-0456", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0456" }, { "cve": "CVE-2020-0457", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0457" }, { "cve": "CVE-2020-0458", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0458" }, { "cve": "CVE-2020-0459", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0459" }, { "cve": "CVE-2020-0460", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0460" }, { "cve": "CVE-2020-0463", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0463" }, { "cve": "CVE-2020-0464", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0464" }, { "cve": "CVE-2020-0465", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0465" }, { "cve": "CVE-2020-0466", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0466" }, { "cve": "CVE-2020-0467", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0467" }, { "cve": "CVE-2020-0468", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0468" }, { "cve": "CVE-2020-0469", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0469" }, { "cve": "CVE-2020-0470", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0470" }, { "cve": "CVE-2020-0473", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0473" }, { "cve": "CVE-2020-0474", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0474" }, { "cve": "CVE-2020-0475", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0475" }, { "cve": "CVE-2020-0476", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0476" }, { "cve": "CVE-2020-0477", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0477" }, { "cve": "CVE-2020-0478", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0478" }, { "cve": "CVE-2020-0479", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0479" }, { "cve": "CVE-2020-0480", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0480" }, { "cve": "CVE-2020-0481", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0481" }, { "cve": "CVE-2020-0482", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0482" }, { "cve": "CVE-2020-0483", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0483" }, { "cve": "CVE-2020-0484", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0484" }, { "cve": "CVE-2020-0485", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0485" }, { "cve": "CVE-2020-0486", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0486" }, { "cve": "CVE-2020-0487", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0487" }, { "cve": "CVE-2020-0488", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0488" }, { "cve": "CVE-2020-0489", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0489" }, { "cve": "CVE-2020-0490", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0490" }, { "cve": "CVE-2020-0491", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0491" }, { "cve": "CVE-2020-0492", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0492" }, { "cve": "CVE-2020-0493", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0493" }, { "cve": "CVE-2020-0494", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0494" }, { "cve": "CVE-2020-0495", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0495" }, { "cve": "CVE-2020-0496", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0496" }, { "cve": "CVE-2020-0497", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0497" }, { "cve": "CVE-2020-0498", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0498" }, { "cve": "CVE-2020-0499", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0499" }, { "cve": "CVE-2020-0500", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0500" }, { "cve": "CVE-2020-11119", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11119" }, { "cve": "CVE-2020-11136", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11136" }, { "cve": "CVE-2020-11137", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11137" }, { "cve": "CVE-2020-11138", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11138" }, { "cve": "CVE-2020-11139", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11139" }, { "cve": "CVE-2020-11140", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11140" }, { "cve": "CVE-2020-11143", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11143" }, { "cve": "CVE-2020-11144", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11144" }, { "cve": "CVE-2020-11145", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11145" }, { "cve": "CVE-2020-11146", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11146" }, { "cve": "CVE-2020-11148", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11148" }, { "cve": "CVE-2020-11149", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11149" }, { "cve": "CVE-2020-11150", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11150" }, { "cve": "CVE-2020-11151", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11151" }, { "cve": "CVE-2020-11152", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11152" }, { "cve": "CVE-2020-11167", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11167" }, { "cve": "CVE-2020-11179", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11179" }, { "cve": "CVE-2020-11183", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11183" }, { "cve": "CVE-2020-11185", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11185" }, { "cve": "CVE-2020-11197", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11197" }, { "cve": "CVE-2020-11200", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11200" }, { "cve": "CVE-2020-11212", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11212" }, { "cve": "CVE-2020-11213", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11213" }, { "cve": "CVE-2020-11214", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11214" }, { "cve": "CVE-2020-11215", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11215" }, { "cve": "CVE-2020-11216", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11216" }, { "cve": "CVE-2020-11217", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11217" }, { "cve": "CVE-2020-11225", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11225" }, { "cve": "CVE-2020-13143", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-13143" }, { "cve": "CVE-2020-15802", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-15802" }, { "cve": "CVE-2020-25220", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-25220" }, { "cve": "CVE-2020-27021", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27021" }, { "cve": "CVE-2020-27023", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27023" }, { "cve": "CVE-2020-27024", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27024" }, { "cve": "CVE-2020-27025", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27025" }, { "cve": "CVE-2020-27026", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27026" }, { "cve": "CVE-2020-27027", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27027" }, { "cve": "CVE-2020-27028", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27028" }, { "cve": "CVE-2020-27029", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27029" }, { "cve": "CVE-2020-27030", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27030" }, { "cve": "CVE-2020-27031", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27031" }, { "cve": "CVE-2020-27032", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27032" }, { "cve": "CVE-2020-27033", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27033" }, { "cve": "CVE-2020-27034", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27034" }, { "cve": "CVE-2020-27035", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27035" }, { "cve": "CVE-2020-27036", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27036" }, { "cve": "CVE-2020-27037", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27037" }, { "cve": "CVE-2020-27038", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27038" }, { "cve": "CVE-2020-27039", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27039" }, { "cve": "CVE-2020-27040", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27040" }, { "cve": "CVE-2020-27041", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27041" }, { "cve": "CVE-2020-27043", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27043" }, { "cve": "CVE-2020-27044", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27044" }, { "cve": "CVE-2020-27045", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27045" }, { "cve": "CVE-2020-27046", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27046" }, { "cve": "CVE-2020-27047", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27047" }, { "cve": "CVE-2020-27048", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27048" }, { "cve": "CVE-2020-27049", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27049" }, { "cve": "CVE-2020-27050", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27050" }, { "cve": "CVE-2020-27051", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27051" }, { "cve": "CVE-2020-27052", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27052" }, { "cve": "CVE-2020-27053", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27053" }, { "cve": "CVE-2020-27054", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27054" }, { "cve": "CVE-2020-27055", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27055" }, { "cve": "CVE-2020-27056", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27056" }, { "cve": "CVE-2020-27057", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27057" }, { "cve": "CVE-2020-27066", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27066" }, { "cve": "CVE-2020-27067", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27067" }, { "cve": "CVE-2020-27068", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27068" }, { "cve": "CVE-2020-3685", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-3685" }, { "cve": "CVE-2020-3686", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-3686" }, { "cve": "CVE-2020-3691", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-3691" }, { "cve": "CVE-2022-42543", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2022-42543" }, { "cve": "CVE-2022-42544", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2022-42544" } ] }
wid-sec-w-2024-0064
Vulnerability from csaf_certbund
Published
2024-01-10 23:00
Modified
2024-01-10 23:00
Summary
Juniper Produkte: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
JUNOS ist das "Juniper Network Operating System", das in Juniper Appliances verwendet wird.
SRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.
Bei den Switches der Juniper EX-Serie handelt es sich um Access- und Aggregations-/Core-Layer-Switches.
Die Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren.
Die Juniper MX-Serie ist eine Produktfamilie von Routern.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS Evolved, Juniper SRX Series, Juniper EX Series, Juniper QFX Series, Juniper ACX Series, Juniper PTX Series und Juniper MX Series ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen und seine Berechtigungen zu erweitern.
Betroffene Betriebssysteme
- BIOS/Firmware
- Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.\r\nSRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.\r\nBei den Switches der Juniper EX-Serie handelt es sich um Access- und Aggregations-/Core-Layer-Switches.\r\nDie Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren. \r\nDie Juniper MX-Serie ist eine Produktfamilie von Routern.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS Evolved, Juniper SRX Series, Juniper EX Series, Juniper QFX Series, Juniper ACX Series, Juniper PTX Series und Juniper MX Series ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und seine Berechtigungen zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0064 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0064.json" }, { "category": "self", "summary": "WID-SEC-2024-0064 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0064" }, { "category": "external", "summary": "Juniper Security Advisory JSA11272 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA11272" }, { "category": "external", "summary": "Juniper Security Advisory JSA75233 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75233" }, { "category": "external", "summary": "Juniper Security Advisory JSA75721 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75721" }, { "category": "external", "summary": "Juniper Security Advisory JSA75723 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75723" }, { "category": "external", "summary": "Juniper Security Advisory JSA75725 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75725" }, { "category": "external", "summary": "Juniper Security Advisory JSA75727 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75727" }, { "category": "external", "summary": "Juniper Security Advisory JSA75729 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75729" }, { "category": "external", "summary": "Juniper Security Advisory JSA75730 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75730" }, { "category": "external", "summary": "Juniper Security Advisory JSA75733 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75733" }, { "category": "external", "summary": "Juniper Security Advisory JSA75734 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75734" }, { "category": "external", "summary": "Juniper Security Advisory JSA75735 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75735" }, { "category": "external", "summary": "Juniper Security Advisory JSA75736 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75736" }, { "category": "external", "summary": "Juniper Security Advisory JSA75737 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75737" }, { "category": "external", "summary": "Juniper Security Advisory JSA75738 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75738" }, { "category": "external", "summary": "Juniper Security Advisory JSA75740 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75740" }, { "category": "external", "summary": "Juniper Security Advisory JSA75741 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75741" }, { "category": "external", "summary": "Juniper Security Advisory JSA75742 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75742" }, { "category": "external", "summary": "Juniper Security Advisory JSA75743 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75743" }, { "category": "external", "summary": "Juniper Security Advisory JSA75744 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75744" }, { "category": "external", "summary": "Juniper Security Advisory JSA75745 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75745" }, { "category": "external", "summary": "Juniper Security Advisory JSA75747 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75747" }, { "category": "external", "summary": "Juniper Security Advisory JSA75748 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75748" }, { "category": "external", "summary": "Juniper Security Advisory JSA75752 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75752" }, { "category": "external", "summary": "Juniper Security Advisory JSA75753 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75753" }, { "category": "external", "summary": "Juniper Security Advisory JSA75754 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75754" }, { "category": "external", "summary": "Juniper Security Advisory JSA75755 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75755" }, { "category": "external", "summary": "Juniper Security Advisory JSA75757 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75757" }, { "category": "external", "summary": "Juniper Security Advisory JSA75758 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75758" } ], "source_lang": "en-US", "title": "Juniper Produkte: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-10T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:56:09.941+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0064", "initial_release_date": "2024-01-10T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-10T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Juniper EX Series", "product": { "name": "Juniper EX Series", "product_id": "T019811", "product_identification_helper": { "cpe": "cpe:/h:juniper:ex:-" } } }, { "category": "product_name", "name": "Juniper EX Series 4600", "product": { "name": "Juniper EX Series 4600", "product_id": "T021598", "product_identification_helper": { "cpe": "cpe:/h:juniper:ex:ex4600" } } }, { "category": "product_name", "name": "Juniper EX Series 4100", "product": { "name": "Juniper EX Series 4100", "product_id": "T030475", "product_identification_helper": { "cpe": "cpe:/h:juniper:ex:4100" } } }, { "category": "product_name", "name": "Juniper EX Series 4400", "product": { "name": "Juniper EX Series 4400", "product_id": "T030476", "product_identification_helper": { "cpe": "cpe:/h:juniper:ex:4400" } } }, { "category": "product_name", "name": "Juniper EX Series EX9200", "product": { "name": "Juniper EX Series EX9200", "product_id": "T031997", "product_identification_helper": { "cpe": "cpe:/h:juniper:ex:ex9200" } } } ], "category": "product_name", "name": "EX Series" }, { "branches": [ { "category": "product_name", "name": "Juniper JUNOS Evolved", "product": { "name": "Juniper JUNOS Evolved", "product_id": "T018886", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:evolved" } } }, { "category": "product_name", "name": "Juniper JUNOS PTX Series", "product": { "name": "Juniper JUNOS PTX Series", "product_id": "T023853", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:ptx_series" } } }, { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "T030471", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } }, { "category": "product_name", "name": "Juniper JUNOS ACX7024", "product": { "name": "Juniper JUNOS ACX7024", "product_id": "T031994", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:acx7024" } } }, { "category": "product_name", "name": "Juniper JUNOS ACX7100-32C", "product": { "name": "Juniper JUNOS ACX7100-32C", "product_id": "T031995", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:acx7100-32c" } } }, { "category": "product_name", "name": "Juniper JUNOS ACX7100-48L", "product": { "name": "Juniper JUNOS ACX7100-48L", "product_id": "T031996", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:acx7100-48l" } } } ], "category": "product_name", "name": "JUNOS" }, { "category": "product_name", "name": "Juniper MX Series", "product": { "name": "Juniper MX Series", "product_id": "918766", "product_identification_helper": { "cpe": "cpe:/h:juniper:mx:-" } } }, { "category": "product_name", "name": "Juniper QFX Series 5000", "product": { "name": "Juniper QFX Series 5000", "product_id": "T021597", "product_identification_helper": { "cpe": "cpe:/h:juniper:qfx:qfx5000" } } }, { "category": "product_name", "name": "Juniper SRX Series", "product": { "name": "Juniper SRX Series", "product_id": "T021593", "product_identification_helper": { "cpe": "cpe:/h:juniper:srx_service_gateways:-" } } } ], "category": "vendor", "name": "Juniper" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2873", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-2873" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-25265", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-25265" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-22942", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-22942" }, { "cve": "CVE-2022-2196", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-2196" }, { "cve": "CVE-2022-21699", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-21699" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-1789", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-1789" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-0934", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-0934" }, { "cve": "CVE-2022-0330", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-0330" }, { "cve": "CVE-2021-44832", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-44832" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-44228", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-44228" }, { "cve": "CVE-2021-4155", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-4155" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-3752", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-3752" }, { "cve": "CVE-2021-3621", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-3621" }, { "cve": "CVE-2021-3573", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-3573" }, { "cve": "CVE-2021-3564", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-3564" }, { "cve": "CVE-2021-34798", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-34798" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-26691", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-26691" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-0920", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-0920" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-12321", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2020-12321" }, { "cve": "CVE-2020-0466", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2020-0466" }, { "cve": "CVE-2020-0465", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2020-0465" }, { "cve": "CVE-2019-17571", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2019-17571" }, { "cve": "CVE-2016-2183", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2016-2183" }, { "cve": "CVE-2024-21617", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21617" }, { "cve": "CVE-2024-21616", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21616" }, { "cve": "CVE-2024-21614", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21614" }, { "cve": "CVE-2024-21613", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21613" }, { "cve": "CVE-2024-21612", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21612" }, { "cve": "CVE-2024-21611", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21611" }, { "cve": "CVE-2024-21607", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21607" }, { "cve": "CVE-2024-21606", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21606" }, { "cve": "CVE-2024-21604", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21604" }, { "cve": "CVE-2024-21603", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21603" }, { "cve": "CVE-2024-21602", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21602" }, { "cve": "CVE-2024-21601", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21601" }, { "cve": "CVE-2024-21600", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21600" }, { "cve": "CVE-2024-21599", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21599" }, { "cve": "CVE-2024-21597", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21597" }, { "cve": "CVE-2024-21596", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21596" }, { "cve": "CVE-2024-21595", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21595" }, { "cve": "CVE-2024-21594", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21594" }, { "cve": "CVE-2024-21591", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21591" }, { "cve": "CVE-2024-21589", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21589" }, { "cve": "CVE-2024-21587", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21587" }, { "cve": "CVE-2024-21585", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21585" }, { "cve": "CVE-2023-38802", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-38802" }, { "cve": "CVE-2023-38408", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-38408" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-36842", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-36842" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3341", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-3341" }, { "cve": "CVE-2023-32360", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-32360" }, { "cve": "CVE-2023-32067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-32067" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26464", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-26464" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-23920", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-23920" }, { "cve": "CVE-2023-23918", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-23918" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-2235", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-2235" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-22049", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-22049" }, { "cve": "CVE-2023-22045", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-22045" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-20593", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-20593" }, { "cve": "CVE-2023-20569", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-20569" }, { "cve": "CVE-2023-1829", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-1829" }, { "cve": "CVE-2023-1582", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-1582" }, { "cve": "CVE-2023-1281", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-1281" }, { "cve": "CVE-2023-1195", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-1195" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-0461", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0461" }, { "cve": "CVE-2023-0394", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0394" }, { "cve": "CVE-2023-0386", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0386" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0266", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0266" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42722", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-42722" }, { "cve": "CVE-2022-42721", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-4269", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-4269" }, { "cve": "CVE-2022-4254", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-4254" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-41674", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-41674" }, { "cve": "CVE-2022-4139", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-4139" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-41222", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-41222" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-39189", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-39189" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-38023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-38023" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-3707", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3707" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3625", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3625" }, { "cve": "CVE-2022-3623", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3623" }, { "cve": "CVE-2022-3619", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3619" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-30594", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-30594" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3028" } ] }
WID-SEC-W-2024-0064
Vulnerability from csaf_certbund
Published
2024-01-10 23:00
Modified
2024-01-10 23:00
Summary
Juniper Produkte: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
JUNOS ist das "Juniper Network Operating System", das in Juniper Appliances verwendet wird.
SRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.
Bei den Switches der Juniper EX-Serie handelt es sich um Access- und Aggregations-/Core-Layer-Switches.
Die Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren.
Die Juniper MX-Serie ist eine Produktfamilie von Routern.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS Evolved, Juniper SRX Series, Juniper EX Series, Juniper QFX Series, Juniper ACX Series, Juniper PTX Series und Juniper MX Series ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen und seine Berechtigungen zu erweitern.
Betroffene Betriebssysteme
- BIOS/Firmware
- Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.\r\nSRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.\r\nBei den Switches der Juniper EX-Serie handelt es sich um Access- und Aggregations-/Core-Layer-Switches.\r\nDie Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren. \r\nDie Juniper MX-Serie ist eine Produktfamilie von Routern.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS Evolved, Juniper SRX Series, Juniper EX Series, Juniper QFX Series, Juniper ACX Series, Juniper PTX Series und Juniper MX Series ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und seine Berechtigungen zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0064 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0064.json" }, { "category": "self", "summary": "WID-SEC-2024-0064 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0064" }, { "category": "external", "summary": "Juniper Security Advisory JSA11272 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA11272" }, { "category": "external", "summary": "Juniper Security Advisory JSA75233 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75233" }, { "category": "external", "summary": "Juniper Security Advisory JSA75721 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75721" }, { "category": "external", "summary": "Juniper Security Advisory JSA75723 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75723" }, { "category": "external", "summary": "Juniper Security Advisory JSA75725 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75725" }, { "category": "external", "summary": "Juniper Security Advisory JSA75727 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75727" }, { "category": "external", "summary": "Juniper Security Advisory JSA75729 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75729" }, { "category": "external", "summary": "Juniper Security Advisory JSA75730 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75730" }, { "category": "external", "summary": "Juniper Security Advisory JSA75733 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75733" }, { "category": "external", "summary": "Juniper Security Advisory JSA75734 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75734" }, { "category": "external", "summary": "Juniper Security Advisory JSA75735 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75735" }, { "category": "external", "summary": "Juniper Security Advisory JSA75736 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75736" }, { "category": "external", "summary": "Juniper Security Advisory JSA75737 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75737" }, { "category": "external", "summary": "Juniper Security Advisory JSA75738 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75738" }, { "category": "external", "summary": "Juniper Security Advisory JSA75740 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75740" }, { "category": "external", "summary": "Juniper Security Advisory JSA75741 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75741" }, { "category": "external", "summary": "Juniper Security Advisory JSA75742 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75742" }, { "category": "external", "summary": "Juniper Security Advisory JSA75743 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75743" }, { "category": "external", "summary": "Juniper Security Advisory JSA75744 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75744" }, { "category": "external", "summary": "Juniper Security Advisory JSA75745 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75745" }, { "category": "external", "summary": "Juniper Security Advisory JSA75747 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75747" }, { "category": "external", "summary": "Juniper Security Advisory JSA75748 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75748" }, { "category": "external", "summary": "Juniper Security Advisory JSA75752 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75752" }, { "category": "external", "summary": "Juniper Security Advisory JSA75753 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75753" }, { "category": "external", "summary": "Juniper Security Advisory JSA75754 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75754" }, { "category": "external", "summary": "Juniper Security Advisory JSA75755 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75755" }, { "category": "external", "summary": "Juniper Security Advisory JSA75757 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75757" }, { "category": "external", "summary": "Juniper Security Advisory JSA75758 vom 2024-01-10", "url": "https://supportportal.juniper.net/JSA75758" } ], "source_lang": "en-US", "title": "Juniper Produkte: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-10T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:56:09.941+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0064", "initial_release_date": "2024-01-10T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-10T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Juniper EX Series", "product": { "name": "Juniper EX Series", "product_id": "T019811", "product_identification_helper": { "cpe": "cpe:/h:juniper:ex:-" } } }, { "category": "product_name", "name": "Juniper EX Series 4600", "product": { "name": "Juniper EX Series 4600", "product_id": "T021598", "product_identification_helper": { "cpe": "cpe:/h:juniper:ex:ex4600" } } }, { "category": "product_name", "name": "Juniper EX Series 4100", "product": { "name": "Juniper EX Series 4100", "product_id": "T030475", "product_identification_helper": { "cpe": "cpe:/h:juniper:ex:4100" } } }, { "category": "product_name", "name": "Juniper EX Series 4400", "product": { "name": "Juniper EX Series 4400", "product_id": "T030476", "product_identification_helper": { "cpe": "cpe:/h:juniper:ex:4400" } } }, { "category": "product_name", "name": "Juniper EX Series EX9200", "product": { "name": "Juniper EX Series EX9200", "product_id": "T031997", "product_identification_helper": { "cpe": "cpe:/h:juniper:ex:ex9200" } } } ], "category": "product_name", "name": "EX Series" }, { "branches": [ { "category": "product_name", "name": "Juniper JUNOS Evolved", "product": { "name": "Juniper JUNOS Evolved", "product_id": "T018886", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:evolved" } } }, { "category": "product_name", "name": "Juniper JUNOS PTX Series", "product": { "name": "Juniper JUNOS PTX Series", "product_id": "T023853", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:ptx_series" } } }, { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "T030471", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } }, { "category": "product_name", "name": "Juniper JUNOS ACX7024", "product": { "name": "Juniper JUNOS ACX7024", "product_id": "T031994", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:acx7024" } } }, { "category": "product_name", "name": "Juniper JUNOS ACX7100-32C", "product": { "name": "Juniper JUNOS ACX7100-32C", "product_id": "T031995", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:acx7100-32c" } } }, { "category": "product_name", "name": "Juniper JUNOS ACX7100-48L", "product": { "name": "Juniper JUNOS ACX7100-48L", "product_id": "T031996", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:acx7100-48l" } } } ], "category": "product_name", "name": "JUNOS" }, { "category": "product_name", "name": "Juniper MX Series", "product": { "name": "Juniper MX Series", "product_id": "918766", "product_identification_helper": { "cpe": "cpe:/h:juniper:mx:-" } } }, { "category": "product_name", "name": "Juniper QFX Series 5000", "product": { "name": "Juniper QFX Series 5000", "product_id": "T021597", "product_identification_helper": { "cpe": "cpe:/h:juniper:qfx:qfx5000" } } }, { "category": "product_name", "name": "Juniper SRX Series", "product": { "name": "Juniper SRX Series", "product_id": "T021593", "product_identification_helper": { "cpe": "cpe:/h:juniper:srx_service_gateways:-" } } } ], "category": "vendor", "name": "Juniper" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2873", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-2873" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-25265", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-25265" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-22942", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-22942" }, { "cve": "CVE-2022-2196", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-2196" }, { "cve": "CVE-2022-21699", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-21699" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-1789", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-1789" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-0934", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-0934" }, { "cve": "CVE-2022-0330", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-0330" }, { "cve": "CVE-2021-44832", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-44832" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-44228", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-44228" }, { "cve": "CVE-2021-4155", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-4155" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-3752", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-3752" }, { "cve": "CVE-2021-3621", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-3621" }, { "cve": "CVE-2021-3573", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-3573" }, { "cve": "CVE-2021-3564", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-3564" }, { "cve": "CVE-2021-34798", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-34798" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-26691", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-26691" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-0920", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2021-0920" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-12321", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2020-12321" }, { "cve": "CVE-2020-0466", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2020-0466" }, { "cve": "CVE-2020-0465", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2020-0465" }, { "cve": "CVE-2019-17571", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2019-17571" }, { "cve": "CVE-2016-2183", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2016-2183" }, { "cve": "CVE-2024-21617", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21617" }, { "cve": "CVE-2024-21616", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21616" }, { "cve": "CVE-2024-21614", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21614" }, { "cve": "CVE-2024-21613", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21613" }, { "cve": "CVE-2024-21612", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21612" }, { "cve": "CVE-2024-21611", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21611" }, { "cve": "CVE-2024-21607", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21607" }, { "cve": "CVE-2024-21606", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21606" }, { "cve": "CVE-2024-21604", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21604" }, { "cve": "CVE-2024-21603", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21603" }, { "cve": "CVE-2024-21602", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21602" }, { "cve": "CVE-2024-21601", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21601" }, { "cve": "CVE-2024-21600", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21600" }, { "cve": "CVE-2024-21599", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21599" }, { "cve": "CVE-2024-21597", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21597" }, { "cve": "CVE-2024-21596", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21596" }, { "cve": "CVE-2024-21595", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21595" }, { "cve": "CVE-2024-21594", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21594" }, { "cve": "CVE-2024-21591", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21591" }, { "cve": "CVE-2024-21589", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21589" }, { "cve": "CVE-2024-21587", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21587" }, { "cve": "CVE-2024-21585", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2024-21585" }, { "cve": "CVE-2023-38802", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-38802" }, { "cve": "CVE-2023-38408", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-38408" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-36842", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-36842" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3341", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-3341" }, { "cve": "CVE-2023-32360", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-32360" }, { "cve": "CVE-2023-32067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-32067" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26464", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-26464" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-23920", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-23920" }, { "cve": "CVE-2023-23918", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-23918" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-2235", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-2235" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-22049", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-22049" }, { "cve": "CVE-2023-22045", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-22045" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-20593", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-20593" }, { "cve": "CVE-2023-20569", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-20569" }, { "cve": "CVE-2023-1829", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-1829" }, { "cve": "CVE-2023-1582", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-1582" }, { "cve": "CVE-2023-1281", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-1281" }, { "cve": "CVE-2023-1195", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-1195" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-0461", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0461" }, { "cve": "CVE-2023-0394", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0394" }, { "cve": "CVE-2023-0386", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0386" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0266", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2023-0266" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42722", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-42722" }, { "cve": "CVE-2022-42721", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-4269", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-4269" }, { "cve": "CVE-2022-4254", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-4254" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-41674", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-41674" }, { "cve": "CVE-2022-4139", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-4139" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-41222", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-41222" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-39189", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-39189" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-38023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-38023" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-3707", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3707" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3625", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3625" }, { "cve": "CVE-2022-3623", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3623" }, { "cve": "CVE-2022-3619", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3619" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-30594", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-30594" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Die Fehler bestehen aufgrund von unsachgem\u00e4\u00dfen Initialisierungen, nicht willk\u00fcrlichen Schreib- und Use-after-free-Fehlern, bei der \u00dcberpr\u00fcfung von \u00fcberm\u00e4\u00dfig langen DH-Schl\u00fcsseln, unsachgem\u00e4\u00dfen Pufferbeschr\u00e4nkungen, einer Speicher\u00fcberschreitung, einer unsachgem\u00e4\u00dfen Behandlung/Pr\u00fcfung von Ausnahmebedingungen, einem Out-of-bounds-Schreiben und einer unsachgem\u00e4\u00dfen Validierung der syntaktischen Korrektheit der Eingabe. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T030475", "T031995", "T030476", "T031994", "T031997", "T031996", "918766", "T030471", "T021598", "T018886", "T021597", "T019811", "T023853", "T021593" ] }, "release_date": "2024-01-10T23:00:00Z", "title": "CVE-2022-3028" } ] }
WID-SEC-W-2022-2387
Vulnerability from csaf_certbund
Published
2020-12-15 23:00
Modified
2023-05-30 22:00
Summary
Google Android Patchday Dezember 2020
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erhöhen, einen Denial of Service Zustand herbeizuführen oder Informationen offenzulegen.
Betroffene Betriebssysteme
- Android
- Blackberry
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das Android Betriebssystem von Google ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erh\u00f6hen, einen Denial of Service Zustand herbeizuf\u00fchren oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Android\n- Blackberry", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2387 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-2387.json" }, { "category": "self", "summary": "WID-SEC-2022-2387 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2387" }, { "category": "external", "summary": "IBM Security Bulletin 6999317 vom 2023-05-30", "url": "https://www.ibm.com/support/pages/node/6999317" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2314-1 vom 2023-05-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/015022.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2021-026 vom 2021-05-07", "url": "https://downloads.avaya.com/css/P8/documents/101075693" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:1093 vom 2021-04-06", "url": "https://access.redhat.com/errata/RHSA-2021:1093" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-1093 vom 2021-04-07", "url": "http://linux.oracle.com/errata/ELSA-2021-1093.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9164 vom 2021-04-09", "url": "http://linux.oracle.com/errata/ELSA-2021-9164.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:2099 vom 2021-05-25", "url": "https://access.redhat.com/errata/RHSA-2021:2099" }, { "category": "external", "summary": "Android Security Bulletin Dezember 2020 vom 2020-12-15", "url": "https://source.android.com/security/bulletin/2020-12-01" }, { "category": "external", "summary": "Pixel Update Bulletin - Dezember 2020", "url": "https://source.android.com/security/bulletin/pixel/2020-12-01" }, { "category": "external", "summary": "BlackBerry Powered by Android Security Bulletin - December 2020", "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000072551" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3933-1 vom 2020-12-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:2106 vom 2021-05-25", "url": "https://access.redhat.com/errata/RHSA-2021:2106" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0452-1 vom 2021-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0686 vom 2021-03-02", "url": "https://access.redhat.com/errata/RHSA-2021:0686" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0689 vom 2021-03-02", "url": "https://access.redhat.com/errata/RHSA-2021:0689" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0763 vom 2021-03-09", "url": "https://access.redhat.com/errata/RHSA-2021:0763" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0774 vom 2021-03-09", "url": "https://access.redhat.com/errata/RHSA-2021:0774" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0765 vom 2021-03-09", "url": "https://access.redhat.com/errata/RHSA-2021:0765" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0529 vom 2022-02-15", "url": "https://access.redhat.com/errata/RHSA-2022:0529" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0533 vom 2022-02-15", "url": "https://access.redhat.com/errata/RHSA-2022:0533" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0531 vom 2022-02-15", "url": "https://access.redhat.com/errata/RHSA-2022:0531" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0592 vom 2022-02-22", "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0622 vom 2022-02-22", "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-026 vom 2022-02-25", "url": "https://downloads.avaya.com/css/P8/documents/101080640" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0712 vom 2022-03-01", "url": "https://access.redhat.com/errata/RHSA-2022:0712" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0718 vom 2022-03-01", "url": "https://access.redhat.com/errata/RHSA-2022:0718" } ], "source_lang": "en-US", "title": "Google Android Patchday Dezember 2020", "tracking": { "current_release_date": "2023-05-30T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:07:42.540+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-2387", "initial_release_date": "2020-12-15T23:00:00.000+00:00", "revision_history": [ { "date": "2020-12-15T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-12-22T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von BlackBerry aufgenommen" }, { "date": "2020-12-27T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-02-14T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-03-01T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-03-08T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-04-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-04-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-04-08T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-05-09T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2021-05-24T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-05-25T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-15T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-22T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-27T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-03-01T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-21T23:00:00.000+00:00", "number": "17", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-05-30T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE und IBM aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Google Android 8.0", "product": { "name": "Google Android 8.0", "product_id": "344177", "product_identification_helper": { "cpe": "cpe:/o:google:android:8.0" } } }, { "category": "product_name", "name": "Google Android 8.1", "product": { "name": "Google Android 8.1", "product_id": "407131", "product_identification_helper": { "cpe": "cpe:/o:google:android:8.1" } } }, { "category": "product_name", "name": "Google Android 10", "product": { "name": "Google Android 10", "product_id": "560061", "product_identification_helper": { "cpe": "cpe:/o:google:android:10.0" } } }, { "category": "product_name", "name": "Google Android 9", "product": { "name": "Google Android 9", "product_id": "T012696", "product_identification_helper": { "cpe": "cpe:/o:google:android:9" } } }, { "category": "product_name", "name": "Google Android 11", "product": { "name": "Google Android 11", "product_id": "T017166", "product_identification_helper": { "cpe": "cpe:/o:google:android:11" } } } ], "category": "product_name", "name": "Android" } ], "category": "vendor", "name": "Google" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Security Guardium 11.4", "product": { "name": "IBM Security Guardium 11.4", "product_id": "1076561", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.4" } } }, { "category": "product_name", "name": "IBM Security Guardium 11.5", "product": { "name": "IBM Security Guardium 11.5", "product_id": "T026399", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.5" } } } ], "category": "product_name", "name": "Security Guardium" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "BlackBerry BlackBerry", "product": { "name": "BlackBerry BlackBerry", "product_id": "1321", "product_identification_helper": { "cpe": "cpe:/h:rim:blackberry:-" } } } ], "category": "vendor", "name": "rim" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16862", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2018-16862" }, { "cve": "CVE-2019-19535", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2019-19535" }, { "cve": "CVE-2019-20812", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2019-20812" }, { "cve": "CVE-2020-0016", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0016" }, { "cve": "CVE-2020-0019", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0019" }, { "cve": "CVE-2020-0099", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0099" }, { "cve": "CVE-2020-0202", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0202" }, { "cve": "CVE-2020-0244", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0244" }, { "cve": "CVE-2020-0280", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0280" }, { "cve": "CVE-2020-0294", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0294" }, { "cve": "CVE-2020-0368", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0368" }, { "cve": "CVE-2020-0440", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0440" }, { "cve": "CVE-2020-0444", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0444" }, { "cve": "CVE-2020-0455", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0455" }, { "cve": "CVE-2020-0456", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0456" }, { "cve": "CVE-2020-0457", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0457" }, { "cve": "CVE-2020-0458", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0458" }, { "cve": "CVE-2020-0459", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0459" }, { "cve": "CVE-2020-0460", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0460" }, { "cve": "CVE-2020-0463", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0463" }, { "cve": "CVE-2020-0464", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0464" }, { "cve": "CVE-2020-0465", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0465" }, { "cve": "CVE-2020-0466", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0466" }, { "cve": "CVE-2020-0467", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0467" }, { "cve": "CVE-2020-0468", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0468" }, { "cve": "CVE-2020-0469", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0469" }, { "cve": "CVE-2020-0470", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0470" }, { "cve": "CVE-2020-0473", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0473" }, { "cve": "CVE-2020-0474", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0474" }, { "cve": "CVE-2020-0475", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0475" }, { "cve": "CVE-2020-0476", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0476" }, { "cve": "CVE-2020-0477", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0477" }, { "cve": "CVE-2020-0478", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0478" }, { "cve": "CVE-2020-0479", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0479" }, { "cve": "CVE-2020-0480", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0480" }, { "cve": "CVE-2020-0481", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0481" }, { "cve": "CVE-2020-0482", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0482" }, { "cve": "CVE-2020-0483", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0483" }, { "cve": "CVE-2020-0484", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0484" }, { "cve": "CVE-2020-0485", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0485" }, { "cve": "CVE-2020-0486", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0486" }, { "cve": "CVE-2020-0487", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0487" }, { "cve": "CVE-2020-0488", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0488" }, { "cve": "CVE-2020-0489", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0489" }, { "cve": "CVE-2020-0490", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0490" }, { "cve": "CVE-2020-0491", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0491" }, { "cve": "CVE-2020-0492", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0492" }, { "cve": "CVE-2020-0493", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0493" }, { "cve": "CVE-2020-0494", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0494" }, { "cve": "CVE-2020-0495", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0495" }, { "cve": "CVE-2020-0496", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0496" }, { "cve": "CVE-2020-0497", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0497" }, { "cve": "CVE-2020-0498", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0498" }, { "cve": "CVE-2020-0499", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0499" }, { "cve": "CVE-2020-0500", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0500" }, { "cve": "CVE-2020-11119", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11119" }, { "cve": "CVE-2020-11136", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11136" }, { "cve": "CVE-2020-11137", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11137" }, { "cve": "CVE-2020-11138", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11138" }, { "cve": "CVE-2020-11139", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11139" }, { "cve": "CVE-2020-11140", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11140" }, { "cve": "CVE-2020-11143", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11143" }, { "cve": "CVE-2020-11144", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11144" }, { "cve": "CVE-2020-11145", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11145" }, { "cve": "CVE-2020-11146", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11146" }, { "cve": "CVE-2020-11148", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11148" }, { "cve": "CVE-2020-11149", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11149" }, { "cve": "CVE-2020-11150", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11150" }, { "cve": "CVE-2020-11151", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11151" }, { "cve": "CVE-2020-11152", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11152" }, { "cve": "CVE-2020-11167", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11167" }, { "cve": "CVE-2020-11179", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11179" }, { "cve": "CVE-2020-11183", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11183" }, { "cve": "CVE-2020-11185", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11185" }, { "cve": "CVE-2020-11197", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11197" }, { "cve": "CVE-2020-11200", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11200" }, { "cve": "CVE-2020-11212", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11212" }, { "cve": "CVE-2020-11213", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11213" }, { "cve": "CVE-2020-11214", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11214" }, { "cve": "CVE-2020-11215", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11215" }, { "cve": "CVE-2020-11216", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11216" }, { "cve": "CVE-2020-11217", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11217" }, { "cve": "CVE-2020-11225", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11225" }, { "cve": "CVE-2020-13143", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-13143" }, { "cve": "CVE-2020-15802", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-15802" }, { "cve": "CVE-2020-25220", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-25220" }, { "cve": "CVE-2020-27021", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27021" }, { "cve": "CVE-2020-27023", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27023" }, { "cve": "CVE-2020-27024", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27024" }, { "cve": "CVE-2020-27025", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27025" }, { "cve": "CVE-2020-27026", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27026" }, { "cve": "CVE-2020-27027", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27027" }, { "cve": "CVE-2020-27028", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27028" }, { "cve": "CVE-2020-27029", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27029" }, { "cve": "CVE-2020-27030", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27030" }, { "cve": "CVE-2020-27031", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27031" }, { "cve": "CVE-2020-27032", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27032" }, { "cve": "CVE-2020-27033", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27033" }, { "cve": "CVE-2020-27034", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27034" }, { "cve": "CVE-2020-27035", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27035" }, { "cve": "CVE-2020-27036", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27036" }, { "cve": "CVE-2020-27037", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27037" }, { "cve": "CVE-2020-27038", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27038" }, { "cve": "CVE-2020-27039", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27039" }, { "cve": "CVE-2020-27040", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27040" }, { "cve": "CVE-2020-27041", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27041" }, { "cve": "CVE-2020-27043", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27043" }, { "cve": "CVE-2020-27044", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27044" }, { "cve": "CVE-2020-27045", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27045" }, { "cve": "CVE-2020-27046", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27046" }, { "cve": "CVE-2020-27047", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27047" }, { "cve": "CVE-2020-27048", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27048" }, { "cve": "CVE-2020-27049", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27049" }, { "cve": "CVE-2020-27050", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27050" }, { "cve": "CVE-2020-27051", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27051" }, { "cve": "CVE-2020-27052", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27052" }, { "cve": "CVE-2020-27053", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27053" }, { "cve": "CVE-2020-27054", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27054" }, { "cve": "CVE-2020-27055", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27055" }, { "cve": "CVE-2020-27056", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27056" }, { "cve": "CVE-2020-27057", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27057" }, { "cve": "CVE-2020-27066", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27066" }, { "cve": "CVE-2020-27067", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27067" }, { "cve": "CVE-2020-27068", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27068" }, { "cve": "CVE-2020-3685", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-3685" }, { "cve": "CVE-2020-3686", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-3686" }, { "cve": "CVE-2020-3691", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-3691" }, { "cve": "CVE-2022-42543", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2022-42543" }, { "cve": "CVE-2022-42544", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2022-42544" } ] }
gsd-2020-0466
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-0466", "description": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "id": "GSD-2020-0466", "references": [ "https://www.suse.com/security/cve/CVE-2020-0466.html", "https://access.redhat.com/errata/RHSA-2022:0718", "https://access.redhat.com/errata/RHSA-2022:0712", "https://access.redhat.com/errata/RHSA-2022:0622", "https://access.redhat.com/errata/RHSA-2022:0620", "https://access.redhat.com/errata/RHSA-2022:0592", "https://access.redhat.com/errata/RHSA-2022:0533", "https://access.redhat.com/errata/RHSA-2022:0531", "https://access.redhat.com/errata/RHSA-2022:0529", "https://access.redhat.com/errata/RHSA-2021:2190", "https://access.redhat.com/errata/RHSA-2021:2185", "https://access.redhat.com/errata/RHSA-2021:2167", "https://access.redhat.com/errata/RHSA-2021:2106", "https://access.redhat.com/errata/RHSA-2021:2099", "https://access.redhat.com/errata/RHSA-2021:1093", "https://access.redhat.com/errata/RHSA-2021:1081", "https://ubuntu.com/security/CVE-2020-0466", "https://access.redhat.com/errata/RHSA-2022:1104", "https://access.redhat.com/errata/RHSA-2022:1417", "https://linux.oracle.com/cve/CVE-2020-0466.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-0466" ], "details": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "id": "GSD-2020-0466", "modified": "2023-12-13T01:21:44.733925Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2020-0466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Android", "version": { "version_data": [ { "version_value": "Android kernel" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2020-12-01", "refsource": "MISC", "url": "https://source.android.com/security/bulletin/2020-12-01" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2020-0466" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2020-12-01", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2020-12-01" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2020-12-15T17:29Z", "publishedDate": "2020-12-14T22:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.