Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-22555 (GCVE-0-2021-22555)
Vulnerability from cvelistv5 – Published: 2021-07-07 11:20 – Updated: 2025-10-21 23:25- CWE-787 - Out-of-bounds Write
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Linux Kernel |
Affected:
2.6.19-rc1 , < unspecified
(custom)
|
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2025-10-06
Due date: 2025-10-27
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Used in ransomware: Unknown
Notes: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 ; https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d ; https://security.netapp.com/advisory/ntap-20210805-0010/ ; https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22555
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:44:14.199Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-22555",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-04T03:55:24.534831Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2025-10-06",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22555"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:25:41.821Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22555"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-10-06T00:00:00+00:00",
"value": "CVE-2021-22555 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Linux Kernel",
"vendor": "n/a",
"versions": [
{
"lessThan": "unspecified",
"status": "affected",
"version": "2.6.19-rc1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Andy Nguyen"
}
],
"datePublic": "2021-07-04T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-06T19:06:15.000Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Heap Out-Of-Bounds Write in Netfilter IP6T_SO_SET_REPLACE",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"DATE_PUBLIC": "2021-07-04T10:00:00.000Z",
"ID": "CVE-2021-22555",
"STATE": "PUBLIC",
"TITLE": "Heap Out-Of-Bounds Write in Netfilter IP6T_SO_SET_REPLACE"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux Kernel",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_value": "2.6.19-rc1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Andy Nguyen"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"refsource": "MISC",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"name": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210805-0010/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210805-0010/"
},
{
"name": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html"
},
{
"name": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html"
},
{
"name": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html"
},
{
"name": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2021-22555",
"datePublished": "2021-07-07T11:20:10.668Z",
"dateReserved": "2021-01-05T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:25:41.821Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2021-22555",
"cwes": "[\"CWE-787\"]",
"dateAdded": "2025-10-06",
"dueDate": "2025-10-27",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21 ; https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d ; https://security.netapp.com/advisory/ntap-20210805-0010/ ; https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"product": "Kernel",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Linux Kernel contains a heap out-of-bounds write vulnerability that could allow an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space.",
"vendorProject": "Linux",
"vulnerabilityName": "Linux Kernel Heap Out-of-Bounds Write Vulnerability"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.6.19\", \"versionEndExcluding\": \"4.4.267\", \"matchCriteriaId\": \"3E869A37-B25A-4CFD-AFA1-964C540B7283\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.5\", \"versionEndExcluding\": \"4.9.267\", \"matchCriteriaId\": \"8F1C60CB-5594-496C-8DF0-68D909707254\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.10\", \"versionEndExcluding\": \"4.14.231\", \"matchCriteriaId\": \"C1285CF4-6285-4288-9981-03A04F93519E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.15\", \"versionEndExcluding\": \"4.19.188\", \"matchCriteriaId\": \"46073F63-74D1-4675-999A-574C1C13B627\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.20\", \"versionEndExcluding\": \"5.4.113\", \"matchCriteriaId\": \"BB3CE52D-3245-4B6C-9C92-897BCB496882\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.5\", \"versionEndExcluding\": \"5.10.31\", \"matchCriteriaId\": \"EB0A42D4-2DAC-4DE0-A20B-A2700AA5E63A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.11\", \"versionEndExcluding\": \"5.12\", \"matchCriteriaId\": \"66C052DB-C48A-43D4-A1A8-AF1E331199D4\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:brocade:fabric_operating_system:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41CD1160-B681-41EF-9EB4-06CE0F53C501\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:fas_8300_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5CDADAB-72A5-4526-8432-E6C9AC56B29F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:fas_8300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E64576DE-90F0-4F5E-9C82-AB745CFEDBB7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:fas_8700_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF5AFE69-7990-4F80-9E63-D8AD58AA3A2D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:fas_8700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6415E28A-4EAC-4F7F-BD81-1A55CE8B6F40\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:aff_a400_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56FD9B9A-BBE5-4CA5-B9F9-B16E1FE738C8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:aff_a400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3E70A56-DBA8-45C7-8C49-1A036501156F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D5DE972-F8B8-4964-943A-DA0BD18289D1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4B1F59C-6ADA-4930-834F-2A8A8444F6AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"578BB9A7-BF28-4068-A9A6-1DE19CEEC293\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AB58180-E5E0-4056-ABF9-A99E9F6A9E86\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89612649-BACF-4FAC-9BA4-324724FD93A6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3D9B255-C1AF-42D1-BF9B-13642FBDC080\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD7CFE0E-9D1E-4495-B302-89C3096FC0DF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5921A877-18BF-43FE-915C-D226E140ACFC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7296A1F2-D315-4FD5-8A73-65C480C855BE\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3C19813-E823-456A-B1CE-EC0684CE1953\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space\"}, {\"lang\": \"es\", \"value\": \"En el archivo net/netfilter/x_tables.c se ha detectado una escritura fuera de l\\u00edmites en la pila que afecta a Linux desde la versi\\u00f3n 2.6.19-rc1. Esto permite a un atacante alcanzar privilegios o causar una denegaci\\u00f3n de servicio (por medio de corrupci\\u00f3n de la memoria de la pila) mediante el espacio de nombres de usuario\"}]",
"id": "CVE-2021-22555",
"lastModified": "2024-11-21T05:50:19.357",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cve-coordination@google.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-07-07T12:15:08.453",
"references": "[{\"url\": \"http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210805-0010/\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210805-0010/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve-coordination@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"cve-coordination@google.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-22555\",\"sourceIdentifier\":\"cve-coordination@google.com\",\"published\":\"2021-07-07T12:15:08.453\",\"lastModified\":\"2025-10-27T17:06:32.497\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space\"},{\"lang\":\"es\",\"value\":\"En el archivo net/netfilter/x_tables.c se ha detectado una escritura fuera de l\u00edmites en la pila que afecta a Linux desde la versi\u00f3n 2.6.19-rc1. Esto permite a un atacante alcanzar privilegios o causar una denegaci\u00f3n de servicio (por medio de corrupci\u00f3n de la memoria de la pila) mediante el espacio de nombres de usuario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2025-10-06\",\"cisaActionDue\":\"2025-10-27\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Linux Kernel Heap Out-of-Bounds Write Vulnerability\",\"weaknesses\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AC7AD92-8B33-4137-A4EC-08641E4AF857\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:c400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD443748-B0D1-4C1A-A62E-BD5FB5967370\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1AB1EC2-2560-494A-A51B-6F20CE318FEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58DE2B52-4E49-4CD0-9310-00291B0352C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.19\",\"versionEndExcluding\":\"4.4.267\",\"matchCriteriaId\":\"3E869A37-B25A-4CFD-AFA1-964C540B7283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.267\",\"matchCriteriaId\":\"8F1C60CB-5594-496C-8DF0-68D909707254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.231\",\"matchCriteriaId\":\"C1285CF4-6285-4288-9981-03A04F93519E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.188\",\"matchCriteriaId\":\"46073F63-74D1-4675-999A-574C1C13B627\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.113\",\"matchCriteriaId\":\"BB3CE52D-3245-4B6C-9C92-897BCB496882\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.31\",\"matchCriteriaId\":\"EB0A42D4-2DAC-4DE0-A20B-A2700AA5E63A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.12\",\"matchCriteriaId\":\"66C052DB-C48A-43D4-A1A8-AF1E331199D4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:brocade:fabric_operating_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41CD1160-B681-41EF-9EB4-06CE0F53C501\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:fas_8300_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5CDADAB-72A5-4526-8432-E6C9AC56B29F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:fas_8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E64576DE-90F0-4F5E-9C82-AB745CFEDBB7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:fas_8700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF5AFE69-7990-4F80-9E63-D8AD58AA3A2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:fas_8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6415E28A-4EAC-4F7F-BD81-1A55CE8B6F40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_a400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56FD9B9A-BBE5-4CA5-B9F9-B16E1FE738C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_a400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E70A56-DBA8-45C7-8C49-1A036501156F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5DE972-F8B8-4964-943A-DA0BD18289D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B1F59C-6ADA-4930-834F-2A8A8444F6AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"578BB9A7-BF28-4068-A9A6-1DE19CEEC293\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB58180-E5E0-4056-ABF9-A99E9F6A9E86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89612649-BACF-4FAC-9BA4-324724FD93A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D9B255-C1AF-42D1-BF9B-13642FBDC080\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7CFE0E-9D1E-4495-B302-89C3096FC0DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5921A877-18BF-43FE-915C-D226E140ACFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7296A1F2-D315-4FD5-8A73-65C480C855BE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_baseboard_management_controller:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D878165F-5C16-4376-8058-28787C9FF923\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210805-0010/\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210805-0010/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22555\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}"
}
}
CERTFR-2021-AVI-912
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM Qradar. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM 7.4.x versions ant\u00e9rieures \u00e0 7.4.3 Fix Pack 4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM 7.3.x versions ant\u00e9rieures \u00e0 7.3.3 Fix Pack 10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2018-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8029"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2021-28163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28163"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2018-11768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11768"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2020-13954",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13954"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2020-7226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7226"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2017-15713",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15713"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-912",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-01T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021.",
"revision_date": "2021-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Qradar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Qradar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520480 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520480"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520472 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520472"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2021-AVI-581
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-581",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-28T00:00:00.000000"
},
{
"description": "Ajout des syst\u00e8mes affect\u00e9s et des bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212559-1 et suse-su-20212560-1 du 29 juillet 2021.",
"revision_date": "2021-07-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212542-1 du 28 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212542-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212560-1 du 29 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212560-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212538-1 du 27 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212538-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212559-1 du 29 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212559-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212487-1 du 27 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212487-1/"
}
]
}
CERTFR-2021-AVI-612
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-612",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212645-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212645-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212643-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212643-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212644-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212644-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212647-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212647-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212646-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212646-1/"
}
]
}
CERTFR-2023-AVI-0051
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2023-22403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
},
{
"name": "CVE-2020-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2023-22393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2023-22407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-22394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
},
{
"name": "CVE-2020-8695",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
},
{
"name": "CVE-2021-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-22404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
},
{
"name": "CVE-2020-14562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2023-22405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2022-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
},
{
"name": "CVE-2023-22409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2023-22416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2018-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2023-22402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2023-22400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2023-22397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2020-8698",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2023-22399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2023-22398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2023-22401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2023-22396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2020-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
},
{
"name": "CVE-2023-22417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2020-14573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-35498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
},
{
"name": "CVE-2023-22406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2023-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-22412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2023-22415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2007-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2023-22410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2023-22408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
},
{
"name": "CVE-2020-14871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2023-22414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2023-22411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2022-21277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2019-11287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2020-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2023-22413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
},
{
"name": "CVE-2023-22395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
},
{
"name": "CVE-2021-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
}
]
}
CERTFR-2021-AVI-612
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-612",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212645-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212645-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212643-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212643-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212644-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212644-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212647-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212647-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212646-1 du 10 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212646-1/"
}
]
}
CERTFR-2021-AVI-570
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-570",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212453-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212453-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212451-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
}
]
}
CERTFR-2021-AVI-581
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-581",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-28T00:00:00.000000"
},
{
"description": "Ajout des syst\u00e8mes affect\u00e9s et des bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212559-1 et suse-su-20212560-1 du 29 juillet 2021.",
"revision_date": "2021-07-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212542-1 du 28 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212542-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212560-1 du 29 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212560-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212538-1 du 27 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212538-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212559-1 du 29 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212559-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212487-1 du 27 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212487-1/"
}
]
}
CERTFR-2021-AVI-720
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.7 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-720",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:3522 du 14 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
]
}
CERTFR-2021-AVI-680
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38201"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-680",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3446 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3446"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3445 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3445"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3444 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3444"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3447 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3447"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3440 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3440"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3363 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
}
]
}
CERTFR-2022-AVI-916
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Contrail Networking versions antérieures à R22.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions antérieures à 3.1.1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.2R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO | ||
| Juniper Networks | N/A | Contrail Networking versions antérieures à 2011.L5 | ||
| Juniper Networks | N/A | Steel Belted Radius Carrier Edition versions antérieures à 8.6.0R16 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à 5.4.7 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions 5.5.x antérieures à 5.5.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions 3.2.x antérieures à 3.2.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance (anciennement Netrounds) versions ant\u00e9rieures \u00e0 3.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Contrail Networking versions ant\u00e9rieures \u00e0 2011.L5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Steel Belted Radius Carrier Edition versions ant\u00e9rieures \u00e0 8.6.0R16",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 5.4.7",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions 5.5.x ant\u00e9rieures \u00e0 5.5.3",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance (anciennement Netrounds) versions 3.2.x ant\u00e9rieures \u00e0 3.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-22243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22243"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2020-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25710"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2022-22238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22238"
},
{
"name": "CVE-2022-22249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22249"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22227"
},
{
"name": "CVE-2016-0701",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0701"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2022-22208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22208"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2017-5929",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5929"
},
{
"name": "CVE-2022-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22218"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2022-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22201"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2018-20532",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20532"
},
{
"name": "CVE-2022-22246",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22246"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2020-29661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"name": "CVE-2022-22250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22250"
},
{
"name": "CVE-2022-22192",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22192"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2022-22239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22239"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2022-22241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22241"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2019-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2435"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2022-22226",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22226"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2019-19532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2022-22229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22229"
},
{
"name": "CVE-2018-20534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20534"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22225"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2022-22245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22245"
},
{
"name": "CVE-2022-25314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2018-10689",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10689"
},
{
"name": "CVE-2016-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2124"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2020-25705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2022-22232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22232"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-12321",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
},
{
"name": "CVE-2022-22240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22240"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-22234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22234"
},
{
"name": "CVE-2022-22242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22242"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2022-22251",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22251"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2022-22244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22244"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2022-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22233"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-45417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2018-20533",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20533"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2022-22224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22224"
},
{
"name": "CVE-2021-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-25211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22247"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2019-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2022-22199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22199"
},
{
"name": "CVE-2021-42550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2022-22236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22236"
},
{
"name": "CVE-2020-7053",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
},
{
"name": "CVE-2022-22248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22248"
},
{
"name": "CVE-2019-9518",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
},
{
"name": "CVE-2022-22220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22220"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22228"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2020-14351",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14351"
},
{
"name": "CVE-2020-25709",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2022-22223",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22223"
},
{
"name": "CVE-2020-25645",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25645"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2020-25717",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2021-41617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2019-2684",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2684"
},
{
"name": "CVE-2021-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0543"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"name": "CVE-2022-22231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22231"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22235"
},
{
"name": "CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2022-22211",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22211"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2022-22230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22230"
},
{
"name": "CVE-2022-22237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22237"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-916",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69906",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-might-be-seen-due-to-mac-moves-within-the-same-bridge-domain-CVE-2022-22249"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69885",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-UTM-Enhanced-Content-Filtering-and-AntiVirus-are-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22231"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69888",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69886",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-Unified-Threat-Management-UTM-Enhanced-Content-Filtering-CF-is-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22232"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69899",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-J-Web"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69881",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-SBR-Carrier-Multiple-Vulnerabilities-resolved-in-version-8-6-0R16-64-bit-Solaris-and-Linux-editions"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69894",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-process-will-crash-when-a-malformed-incoming-RESV-message-is-processed-CVE-2022-22238"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69898",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-core-upon-receipt-of-a-specific-EVPN-route-by-a-BGP-route-reflector-in-an-EVPN-environment-CVE-2022-22199"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69895",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-The-ssh-CLI-command-always-runs-as-root-which-can-lead-to-privilege-escalation-CVE-2022-22239"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69908",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-cSRX-Series-Storing-Passwords-in-a-Recoverable-Format-and-software-permissions-issues-allows-a-local-attacker-to-elevate-privileges-CVE-2022-22251"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69874",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PPMD-goes-into-infinite-loop-upon-receipt-of-malformed-OSPF-TLV-CVE-2022-22224"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69902",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Due-to-a-race-condition-the-rpd-process-can-crash-upon-receipt-of-a-BGP-update-message-containing-flow-spec-route-CVE-2022-22220"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69879",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-can-occur-due-to-memory-corruption-caused-by-flapping-BGP-sessions-CVE-2022-22208"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69890",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX2300-and-EX3400-Series-One-of-more-SFPs-might-become-unavailable-when-the-system-is-very-busy-CVE-2022-22234"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69875",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-multipath-scenario-when-one-of-the-contributing-routes-is-flapping-often-and-rapidly-rpd-may-crash-CVE-2022-22225"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69915",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-An-attacker-can-cause-a-kernel-panic-by-sending-a-malformed-TCP-packet-to-the-device-CVE-2022-22192"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69878",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Specific-IPv6-transit-traffic-gets-exceptioned-to-the-routing-engine-which-will-cause-increased-CPU-utilization-CVE-2022-22227"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69907",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-FPC-might-crash-and-reload-if-the-EVPN-MAC-entry-is-move-from-local-to-remote-CVE-2022-22250"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69891",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-A-flowd-core-will-be-observed-when-malformed-GPRS-traffic-is-processed-CVE-2022-22235"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69882",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69876",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX4300-MP-EX4600-QFX5000-Series-In-VxLAN-scenarios-specific-packets-processed-cause-a-memory-leak-leading-to-a-PFE-crash-CVE-2022-22226"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69892",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-When-specific-valid-SIP-packets-are-received-the-PFE-will-crash-CVE-2022-22236"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69889",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69887",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-SR-to-LDP-interworking-scenario-with-SRMS-when-a-specific-low-privileged-command-is-issued-on-an-ABR-rpd-will-crash-CVE-2022-22233"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69900",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX5000-Series-with-SPC3-SRX4000-Series-and-vSRX-When-PowerMode-IPsec-is-configured-the-PFE-will-crash-upon-receipt-of-a-malformed-ESP-packet-CVE-2022-22201"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69884",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-specific-OSPFv3-LSAs-CVE-2022-22230"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69901",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Upon-processing-of-a-genuine-packet-the-pkid-process-will-crash-during-CMPv2-auto-re-enrollment-CVE-2022-22218"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69905",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Incorrect-file-permissions-can-allow-low-privileged-user-to-cause-another-user-to-execute-arbitrary-commands-CVE-2022-22248"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69893",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Peers-not-configured-for-TCP-AO-can-establish-a-BGP-or-LDP-session-even-if-authentication-is-configured-locally-CVE-2022-22237"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69904",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Kernel-processing-of-unvalidated-TCP-segments-could-lead-to-a-Denial-of-Service-DoS-CVE-2022-22247"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69880",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-On-IPv6-OAM-SRv6-network-enabled-devices-an-attacker-sending-a-specific-genuine-packet-to-an-IPv6-address-configured-on-the-device-may-cause-a-RPD-memory-leak-leading-to-an-RPD-core-CVE-2022-22228"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69873",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-QFX10000-Series-In-IP-MPLS-PHP-node-scenarios-upon-receipt-of-certain-crafted-packets-multiple-interfaces-in-LAG-configurations-may-detach-CVE-2022-22223"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69896",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-memory-leak-might-be-observed-while-running-a-specific-cli-command-in-a-RIB-sharding-scenario-CVE-2022-22240"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69897",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-release-2011-L5"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69916",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-Multiple-FPCs-become-unreachable-due-to-continuous-polling-of-specific-SNMP-OID-CVE-2022-22211"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69883",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Paragon-Active-Assurance-Formerly-Netrounds-Stored-Cross-site-Scripting-XSS-vulnerability-in-web-administration-CVE-2022-22229"
}
]
}
CERTFR-2021-AVI-585
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212584-1 du 02 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212584-1/"
}
]
}
CERTFR-2021-AVI-550
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-550",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212415-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212415-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212408-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212408-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212407-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212407-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212416-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212416-1/"
}
]
}
CERTFR-2021-AVI-584
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-584",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212577-1 du 30 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/"
}
]
}
CERTFR-2021-AVI-563
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212427-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212427-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212422-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212422-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212421-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212426-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212426-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212433-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212433-1"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212438-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212438-1/"
}
],
"reference": "CERTFR-2021-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": []
}
CERTFR-2021-AVI-680
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38201"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-680",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3446 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3446"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3445 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3445"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3444 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3444"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3447 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3447"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3440 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3440"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3363 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
}
]
}
CERTFR-2021-AVI-635
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2021-3587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3587"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-28691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28691"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-635",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5044-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5044-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0080-1 du 16 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/LSN-0080-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5046-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5046-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5045-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5045-1"
}
]
}
CERTFR-2023-AVI-0051
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2023-22403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
},
{
"name": "CVE-2020-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2023-22393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2023-22407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-22394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
},
{
"name": "CVE-2020-8695",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
},
{
"name": "CVE-2021-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-22404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
},
{
"name": "CVE-2020-14562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2023-22405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2022-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
},
{
"name": "CVE-2023-22409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2023-22416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2018-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2023-22402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2023-22400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2023-22397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2020-8698",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2023-22399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2023-22398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2023-22401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2023-22396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2020-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
},
{
"name": "CVE-2023-22417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2020-14573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-35498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
},
{
"name": "CVE-2023-22406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2023-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-22412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2023-22415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2007-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2023-22410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2023-22408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
},
{
"name": "CVE-2020-14871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2023-22414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2023-22411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2022-21277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2019-11287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2020-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2023-22413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
},
{
"name": "CVE-2023-22395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
},
{
"name": "CVE-2021-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
}
]
}
CERTFR-2021-AVI-635
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2021-3587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3587"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-28691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28691"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-635",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5044-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5044-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0080-1 du 16 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/LSN-0080-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5046-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5046-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5045-1 du 18 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5045-1"
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2021-AVI-912
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM Qradar. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM 7.4.x versions ant\u00e9rieures \u00e0 7.4.3 Fix Pack 4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM 7.3.x versions ant\u00e9rieures \u00e0 7.3.3 Fix Pack 10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2018-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8029"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2021-28163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28163"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2018-11768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11768"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2020-13954",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13954"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2020-7226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7226"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2017-15713",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15713"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-912",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-01T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021.",
"revision_date": "2021-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Qradar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Qradar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520480 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520480"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520472 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520472"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2021-AVI-786
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-786",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3812 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3766 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3766"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3801 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3801"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3802 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3802"
}
]
}
CERTFR-2021-AVI-665
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-665",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3321 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3327 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3375 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3320 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3399 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
]
}
CERTFR-2021-AVI-640
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-640",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3173 du 17 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
}
]
}
CERTFR-2021-AVI-720
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.7 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-720",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:3522 du 14 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
]
}
CERTFR-2021-AVI-570
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-570",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212453-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212453-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212451-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
}
]
}
CERTFR-2021-AVI-699
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-699",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0081-1 du 13 septembre 2021",
"url": "https://ubuntu.com/security/notices/LSN-0081-1"
}
]
}
CERTFR-2021-AVI-602
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-602",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212599-2 du 05 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212599-2/"
}
]
}
CERTFR-2021-AVI-563
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212427-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212427-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212422-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212422-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212421-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212426-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212426-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212433-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212433-1"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212438-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212438-1/"
}
],
"reference": "CERTFR-2021-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": []
}
CERTFR-2021-AVI-585
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212584-1 du 02 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212584-1/"
}
]
}
CERTFR-2021-AVI-550
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-550",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212415-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212415-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212408-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212408-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212407-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212407-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212416-1 du 20 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212416-1/"
}
]
}
CERTFR-2021-AVI-611
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-611",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3088 du 10 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3057 du 10 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
}
]
}
CERTFR-2021-AVI-786
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-786",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3812 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3812"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3766 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3766"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3801 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3801"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3802 du 12 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3802"
}
]
}
CERTFR-2022-AVI-916
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Contrail Networking versions antérieures à R22.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions antérieures à 3.1.1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.2R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO | ||
| Juniper Networks | N/A | Contrail Networking versions antérieures à 2011.L5 | ||
| Juniper Networks | N/A | Steel Belted Radius Carrier Edition versions antérieures à 8.6.0R16 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à 5.4.7 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions 5.5.x antérieures à 5.5.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions 3.2.x antérieures à 3.2.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance (anciennement Netrounds) versions ant\u00e9rieures \u00e0 3.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Contrail Networking versions ant\u00e9rieures \u00e0 2011.L5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Steel Belted Radius Carrier Edition versions ant\u00e9rieures \u00e0 8.6.0R16",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 5.4.7",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions 5.5.x ant\u00e9rieures \u00e0 5.5.3",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance (anciennement Netrounds) versions 3.2.x ant\u00e9rieures \u00e0 3.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-22243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22243"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2020-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25710"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2022-22238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22238"
},
{
"name": "CVE-2022-22249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22249"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22227"
},
{
"name": "CVE-2016-0701",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0701"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2022-22208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22208"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2017-5929",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5929"
},
{
"name": "CVE-2022-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22218"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2022-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22201"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2018-20532",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20532"
},
{
"name": "CVE-2022-22246",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22246"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2020-29661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"name": "CVE-2022-22250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22250"
},
{
"name": "CVE-2022-22192",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22192"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2022-22239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22239"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2022-22241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22241"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2019-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2435"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2022-22226",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22226"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2019-19532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2022-22229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22229"
},
{
"name": "CVE-2018-20534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20534"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22225"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2022-22245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22245"
},
{
"name": "CVE-2022-25314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2018-10689",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10689"
},
{
"name": "CVE-2016-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2124"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2020-25705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2022-22232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22232"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-12321",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
},
{
"name": "CVE-2022-22240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22240"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-22234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22234"
},
{
"name": "CVE-2022-22242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22242"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2022-22251",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22251"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2022-22244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22244"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2022-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22233"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-45417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2018-20533",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20533"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2022-22224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22224"
},
{
"name": "CVE-2021-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-25211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22247"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2019-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2022-22199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22199"
},
{
"name": "CVE-2021-42550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2022-22236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22236"
},
{
"name": "CVE-2020-7053",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
},
{
"name": "CVE-2022-22248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22248"
},
{
"name": "CVE-2019-9518",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
},
{
"name": "CVE-2022-22220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22220"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22228"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2020-14351",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14351"
},
{
"name": "CVE-2020-25709",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2022-22223",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22223"
},
{
"name": "CVE-2020-25645",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25645"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2020-25717",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2021-41617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2019-2684",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2684"
},
{
"name": "CVE-2021-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0543"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"name": "CVE-2022-22231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22231"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22235"
},
{
"name": "CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2022-22211",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22211"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2022-22230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22230"
},
{
"name": "CVE-2022-22237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22237"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-916",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69906",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-might-be-seen-due-to-mac-moves-within-the-same-bridge-domain-CVE-2022-22249"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69885",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-UTM-Enhanced-Content-Filtering-and-AntiVirus-are-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22231"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69888",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69886",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-Unified-Threat-Management-UTM-Enhanced-Content-Filtering-CF-is-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22232"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69899",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-J-Web"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69881",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-SBR-Carrier-Multiple-Vulnerabilities-resolved-in-version-8-6-0R16-64-bit-Solaris-and-Linux-editions"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69894",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-process-will-crash-when-a-malformed-incoming-RESV-message-is-processed-CVE-2022-22238"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69898",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-core-upon-receipt-of-a-specific-EVPN-route-by-a-BGP-route-reflector-in-an-EVPN-environment-CVE-2022-22199"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69895",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-The-ssh-CLI-command-always-runs-as-root-which-can-lead-to-privilege-escalation-CVE-2022-22239"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69908",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-cSRX-Series-Storing-Passwords-in-a-Recoverable-Format-and-software-permissions-issues-allows-a-local-attacker-to-elevate-privileges-CVE-2022-22251"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69874",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PPMD-goes-into-infinite-loop-upon-receipt-of-malformed-OSPF-TLV-CVE-2022-22224"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69902",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Due-to-a-race-condition-the-rpd-process-can-crash-upon-receipt-of-a-BGP-update-message-containing-flow-spec-route-CVE-2022-22220"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69879",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-can-occur-due-to-memory-corruption-caused-by-flapping-BGP-sessions-CVE-2022-22208"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69890",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX2300-and-EX3400-Series-One-of-more-SFPs-might-become-unavailable-when-the-system-is-very-busy-CVE-2022-22234"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69875",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-multipath-scenario-when-one-of-the-contributing-routes-is-flapping-often-and-rapidly-rpd-may-crash-CVE-2022-22225"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69915",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-An-attacker-can-cause-a-kernel-panic-by-sending-a-malformed-TCP-packet-to-the-device-CVE-2022-22192"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69878",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Specific-IPv6-transit-traffic-gets-exceptioned-to-the-routing-engine-which-will-cause-increased-CPU-utilization-CVE-2022-22227"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69907",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-FPC-might-crash-and-reload-if-the-EVPN-MAC-entry-is-move-from-local-to-remote-CVE-2022-22250"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69891",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-A-flowd-core-will-be-observed-when-malformed-GPRS-traffic-is-processed-CVE-2022-22235"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69882",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69876",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX4300-MP-EX4600-QFX5000-Series-In-VxLAN-scenarios-specific-packets-processed-cause-a-memory-leak-leading-to-a-PFE-crash-CVE-2022-22226"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69892",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-When-specific-valid-SIP-packets-are-received-the-PFE-will-crash-CVE-2022-22236"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69889",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69887",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-SR-to-LDP-interworking-scenario-with-SRMS-when-a-specific-low-privileged-command-is-issued-on-an-ABR-rpd-will-crash-CVE-2022-22233"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69900",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX5000-Series-with-SPC3-SRX4000-Series-and-vSRX-When-PowerMode-IPsec-is-configured-the-PFE-will-crash-upon-receipt-of-a-malformed-ESP-packet-CVE-2022-22201"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69884",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-specific-OSPFv3-LSAs-CVE-2022-22230"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69901",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Upon-processing-of-a-genuine-packet-the-pkid-process-will-crash-during-CMPv2-auto-re-enrollment-CVE-2022-22218"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69905",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Incorrect-file-permissions-can-allow-low-privileged-user-to-cause-another-user-to-execute-arbitrary-commands-CVE-2022-22248"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69893",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Peers-not-configured-for-TCP-AO-can-establish-a-BGP-or-LDP-session-even-if-authentication-is-configured-locally-CVE-2022-22237"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69904",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Kernel-processing-of-unvalidated-TCP-segments-could-lead-to-a-Denial-of-Service-DoS-CVE-2022-22247"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69880",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-On-IPv6-OAM-SRv6-network-enabled-devices-an-attacker-sending-a-specific-genuine-packet-to-an-IPv6-address-configured-on-the-device-may-cause-a-RPD-memory-leak-leading-to-an-RPD-core-CVE-2022-22228"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69873",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-QFX10000-Series-In-IP-MPLS-PHP-node-scenarios-upon-receipt-of-certain-crafted-packets-multiple-interfaces-in-LAG-configurations-may-detach-CVE-2022-22223"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69896",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-memory-leak-might-be-observed-while-running-a-specific-cli-command-in-a-RIB-sharding-scenario-CVE-2022-22240"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69897",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-release-2011-L5"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69916",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-Multiple-FPCs-become-unreachable-due-to-continuous-polling-of-specific-SNMP-OID-CVE-2022-22211"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69883",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Paragon-Active-Assurance-Formerly-Netrounds-Stored-Cross-site-Scripting-XSS-vulnerability-in-web-administration-CVE-2022-22229"
}
]
}
CERTFR-2021-AVI-628
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le noyau Linux d'Ubuntu. Elle permet à un attaquant de provoquer une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-628",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux d\u0027Ubuntu. Elle\npermet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire et\nun d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5039-1 du 12 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5039-1"
}
]
}
CERTFR-2021-AVI-640
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-640",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3173 du 17 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
}
]
}
CERTFR-2021-AVI-584
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-584",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212577-1 du 30 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/"
}
]
}
CERTFR-2021-AVI-665
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-665",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3321 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3327 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3375 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3320 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3399 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
]
}
CERTFR-2021-AVI-752
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-752",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3725 du 05 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
}
]
}
CERTFR-2025-AVI-0893
Vulnerability from certfr_avis - Published: 2025-10-17 - Updated: 2025-10-17
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian 10 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 10 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 10 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems 10 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 10 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 10 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 10 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 10 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 10 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 10 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 10 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 10 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian 8 ppc64le |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 10 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 10 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 10 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 10 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 10 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 10 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 10 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 10 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 10 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 10 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 10 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 10 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50229"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2023-53305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53305"
},
{
"name": "CVE-2022-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49969"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2023-53186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53186"
},
{
"name": "CVE-2023-53125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53125"
},
{
"name": "CVE-2022-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49985"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2023-53373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53373"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2022-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50087"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2022-50228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50228"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
}
],
"initial_release_date": "2025-10-17T00:00:00",
"last_revision_date": "2025-10-17T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0893",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Red Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17735",
"url": "https://access.redhat.com/errata/RHSA-2025:17735"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:18054",
"url": "https://access.redhat.com/errata/RHSA-2025:18054"
},
{
"published_at": "2025-10-06",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17397",
"url": "https://access.redhat.com/errata/RHSA-2025:17397"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17797",
"url": "https://access.redhat.com/errata/RHSA-2025:17797"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17734",
"url": "https://access.redhat.com/errata/RHSA-2025:17734"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:18043",
"url": "https://access.redhat.com/errata/RHSA-2025:18043"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:18098",
"url": "https://access.redhat.com/errata/RHSA-2025:18098"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17733",
"url": "https://access.redhat.com/errata/RHSA-2025:17733"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17776",
"url": "https://access.redhat.com/errata/RHSA-2025:17776"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17958",
"url": "https://access.redhat.com/errata/RHSA-2025:17958"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17812",
"url": "https://access.redhat.com/errata/RHSA-2025:17812"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17760",
"url": "https://access.redhat.com/errata/RHSA-2025:17760"
}
]
}
CERTFR-2021-AVI-752
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-752",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3725 du 05 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
}
]
}
CERTFR-2021-AVI-611
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-611",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3088 du 10 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3057 du 10 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
}
]
}
CERTFR-2021-AVI-595
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-595",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212599-1 du 03 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212599-1/"
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2021-AVI-699
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-699",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0081-1 du 13 septembre 2021",
"url": "https://ubuntu.com/security/notices/LSN-0081-1"
}
]
}
CERTFR-2025-AVI-0893
Vulnerability from certfr_avis - Published: 2025-10-17 - Updated: 2025-10-17
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian 10 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 10 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 10 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems 10 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 10 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 10 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 10 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 10 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - TUS 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - AUS 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 9.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 10 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 10 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 10 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 10 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat Enterprise Linux for Power, little endian 8 ppc64le |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 10 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 10 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 10 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 10 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 10 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 10 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 10 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 10 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 9.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 10 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 10 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 10 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 10 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-50229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50229"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2023-53305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53305"
},
{
"name": "CVE-2022-49969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49969"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2023-53186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53186"
},
{
"name": "CVE-2023-53125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53125"
},
{
"name": "CVE-2022-49985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49985"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2023-53373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53373"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2022-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50087"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2022-50228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50228"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
}
],
"initial_release_date": "2025-10-17T00:00:00",
"last_revision_date": "2025-10-17T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0893",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Red Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17735",
"url": "https://access.redhat.com/errata/RHSA-2025:17735"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:18054",
"url": "https://access.redhat.com/errata/RHSA-2025:18054"
},
{
"published_at": "2025-10-06",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17397",
"url": "https://access.redhat.com/errata/RHSA-2025:17397"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17797",
"url": "https://access.redhat.com/errata/RHSA-2025:17797"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17734",
"url": "https://access.redhat.com/errata/RHSA-2025:17734"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:18043",
"url": "https://access.redhat.com/errata/RHSA-2025:18043"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:18098",
"url": "https://access.redhat.com/errata/RHSA-2025:18098"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17733",
"url": "https://access.redhat.com/errata/RHSA-2025:17733"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17776",
"url": "https://access.redhat.com/errata/RHSA-2025:17776"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17958",
"url": "https://access.redhat.com/errata/RHSA-2025:17958"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17812",
"url": "https://access.redhat.com/errata/RHSA-2025:17812"
},
{
"published_at": "2025-10-13",
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2025:17760",
"url": "https://access.redhat.com/errata/RHSA-2025:17760"
}
]
}
CERTFR-2021-AVI-628
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans le noyau Linux d'Ubuntu. Elle permet à un attaquant de provoquer une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-628",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux d\u0027Ubuntu. Elle\npermet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire et\nun d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5039-1 du 12 ao\u00fbt 2021",
"url": "https://ubuntu.com/security/notices/USN-5039-1"
}
]
}
CERTFR-2021-AVI-602
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-602",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212599-2 du 05 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212599-2/"
}
]
}
CERTFR-2021-AVI-595
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-595",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212599-1 du 03 ao\u00fbt 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212599-1/"
}
]
}
RHSA-2021_3088
Vulnerability from csaf_redhat - Published: 2021-08-10 13:17 - Updated: 2024-11-15 11:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z source tree (BZ#1985050)\n\n* kernel-rt: Merge mm/memcg: Fix kmem_cache_alloc() performance regression (BZ#1987102)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3088",
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3088.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:54:17+00:00",
"generator": {
"date": "2024-11-15T11:54:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3088",
"initial_release_date": "2021-08-10T13:17:32+00:00",
"revision_history": [
{
"date": "2021-08-10T13:17:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T13:17:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:54:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.12.1.rt7.84.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:17:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3088"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.12.1.rt7.84.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
RHSA-2021:3173
Vulnerability from csaf_redhat - Published: 2021-08-17 08:35 - Updated: 2025-11-21 18:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3173",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3173.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:24:25+00:00",
"generator": {
"date": "2025-11-21T18:24:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3173",
"initial_release_date": "2021-08-17T08:35:56+00:00",
"revision_history": [
{
"date": "2021-08-17T08:35:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:35:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:24:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3327
Vulnerability from csaf_redhat - Published: 2021-08-31 09:22 - Updated: 2025-11-21 18:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1897576)\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1915449)\n\n* XFS: read-only recovery does not update free space accounting in superblock (BZ#1921551)\n\n* The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. (BZ#1951810)\n\n* Backport of upstream patch \"net: Update window_clamp if SOCK_RCVBUF is set \" into rhel-7 (BZ#1962196)\n\n* Kernel panic in init_cq_frag_buf (BZ#1962499)\n\n* futex: futex_requeue can potentially free the pi_state structure twice (BZ#1966856)\n\n* be_poll lockup doing ifenslave when netconsole using bond (BZ#1971744)\n\n* OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() (BZ#1972970)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3327",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1897576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897576"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3327.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:24:37+00:00",
"generator": {
"date": "2025-11-21T18:24:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3327",
"initial_release_date": "2021-08-31T09:22:59+00:00",
"revision_history": [
{
"date": "2021-08-31T09:22:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:22:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:24:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.41.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.41.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021_3523
Vulnerability from csaf_redhat - Published: 2021-09-14 08:54 - Updated: 2024-11-15 11:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3523",
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3523.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:56:11+00:00",
"generator": {
"date": "2024-11-15T11:56:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3523",
"initial_release_date": "2021-09-14T08:54:45+00:00",
"revision_history": [
{
"date": "2021-09-14T08:54:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:54:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:56:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3057
Vulnerability from csaf_redhat - Published: 2021-08-10 13:19 - Updated: 2025-11-21 18:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Urgent: Missing dptf_power.ko module in RHEL8 (BZ#1968381)\n\n* [mlx5] kdump over NFS fails: mlx5 driver gives error \"Stop room 95 is bigger than the SQ size 64\" (BZ#1969909)\n\n* BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 in bluetooth hci_error_reset on intel-tigerlake-h01 (BZ#1972564)\n\n* Update CIFS to kernel 5.10 (BZ#1973637)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978710)\n\n* Significant performance drop starting on kernel-4.18.0-277 visible on mmap benchmark (BZ#1980314)\n\n* Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?) (BZ#1980613)\n\n* [RHEL8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new 120HZ panel (BZ#1981250)\n\n* act_ct: subject to DNAT tuple collision (BZ#1982494)\n\nEnhancement(s):\n\n* [Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream (BZ#1965415)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3057",
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3057.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:24:15+00:00",
"generator": {
"date": "2025-11-21T18:24:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3057",
"initial_release_date": "2021-08-10T13:19:09+00:00",
"revision_history": [
{
"date": "2021-08-10T13:19:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T13:19:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:24:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.12.1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.12.1.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product_id": "kernel-0:4.18.0-305.12.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.12.1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.12.1.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.12.1.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T13:19:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3057"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.12.1.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.12.1.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.12.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
RHSA-2021_3181
Vulnerability from csaf_redhat - Published: 2021-08-17 08:33 - Updated: 2024-11-15 11:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3181",
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3181.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:14+00:00",
"generator": {
"date": "2024-11-15T11:55:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3181",
"initial_release_date": "2021-08-17T08:33:52+00:00",
"revision_history": [
{
"date": "2021-08-17T08:33:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:33:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021_3522
Vulnerability from csaf_redhat - Published: 2021-09-14 08:53 - Updated: 2024-11-15 11:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1972707)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975158)\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1984118)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3522",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3522.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:56:04+00:00",
"generator": {
"date": "2024-11-15T11:56:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3522",
"initial_release_date": "2021-09-14T08:53:04+00:00",
"revision_history": [
{
"date": "2021-09-14T08:53:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:53:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:56:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.56.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.56.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802559"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "RHBZ#1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
}
],
"release_date": "2020-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3235
Vulnerability from csaf_redhat - Published: 2021-08-19 15:51 - Updated: 2025-11-21 18:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a\nspecial build of Red Hat Enterprise Linux with only the packages required to\nhost virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe ()\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebase package(s) to version: 1.2.23\n\nHighlights, important fixes, or notable enhancements: \n\n* imgbase should not copy the selinux binary policy file (BZ# 1979624) (BZ#1989397)\n\n* RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. (BZ#1975177)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3235",
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1956284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1975177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975177"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1989397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989397"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3235.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
"tracking": {
"current_release_date": "2025-11-21T18:24:29+00:00",
"generator": {
"date": "2025-11-21T18:24:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3235",
"initial_release_date": "2021-08-19T15:51:36+00:00",
"revision_history": [
{
"date": "2021-08-19T15:51:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-19T15:51:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:24:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.23-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.23-1.el8ev.src",
"product_id": "imgbased-0:1.2.23-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product_id": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210804.0.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-4.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210804.0.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-4.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.23-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.23-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.23-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.23-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.23-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.23-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.23-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.23-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.23-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.23-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"acknowledgments": [
{
"names": [
"Laszlo Ersek"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-38575",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1956284"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in edk2. Missing checks in the IScsiHexToBin function in NetworkPkg/IScsiDxe lead to a buffer overflow allowing a remote attacker, who can inject himself in the communication between edk2 and the iSCSI target, to write arbitrary data to any address in the edk2 firmware and potentially execute code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-38575"
},
{
"category": "external",
"summary": "RHBZ#1956284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956284"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38575"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38575"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-19T15:51:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3235"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210804.0.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210804.0.el8_4.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.23-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.23-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-4.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-4.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe"
}
]
}
RHSA-2021:3477
Vulnerability from csaf_redhat - Published: 2021-09-09 09:25 - Updated: 2025-11-21 18:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* libX11: missing request length checks (CVE-2021-31535)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3477",
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3477.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.18",
"tracking": {
"current_release_date": "2025-11-21T18:24:49+00:00",
"generator": {
"date": "2025-11-21T18:24:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3477",
"initial_release_date": "2021-09-09T09:25:32+00:00",
"revision_history": [
{
"date": "2021-09-09T09:25:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-09T09:25:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:24:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.18-20210903.0.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.18-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.18-20210903.0.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"acknowledgments": [
{
"names": [
"Zhenpeng Lin"
]
}
],
"cve": "CVE-2021-3715",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1993988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "RHBZ#1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
}
],
"release_date": "2021-09-07T08:25:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-31535",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2021-05-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961822"
}
],
"notes": [
{
"category": "description",
"text": "A missing validation flaw was found in libX11. This flaw allows an attacker to inject X11 protocol commands on X clients, and in some cases, also bypass, authenticate (via injection of control characters), or potentially execute arbitrary code with permissions of the application compiled with libX11. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libX11: missing request length checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was rated with an important severity as it allows an attacker to inject X11 protocol commands on X clients with the privileges of the application linked with the libX11 library, potentially having administrative privileges. However, Red Hat Enterprise Linux 8 and 9 do not run the Xorg server with root privileges, lowering the security impact of this issue. For this reason, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-20: Improper Input Validation -\u003e CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality and least privilege to ensure that only essential services, features, and ports are enabled, reducing the attack surface and exposure to input-driven or command injection vulnerabilities. Secure baseline configurations are established during system design, and CI/CD pipelines enforce security through SAST/DAST testing, restricted command execution, and mandatory peer reviews for manual code promotions. Input validation is consistently applied across all services within the system boundary to prevent improper handling of untrusted data. Process isolation ensures that components handling external input operate in separate execution domains, containing potential impact. Malicious code protections, including IDS and IPS, work with real-time monitoring to detect and respond to exploitation attempts. Centralized logging supports correlation, alerting, and anomaly detection, while robust error handling further reduces the risk of system instability or data exposure resulting from unvalidated input or improper command execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31535"
},
{
"category": "external",
"summary": "RHBZ#1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535"
},
{
"category": "external",
"summary": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/",
"url": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/"
},
{
"category": "external",
"summary": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt",
"url": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "xterm should not be used to display less trusted data, e.g. from SSH connections to less trusted remote machines.\nTo avoid attacks via .Xdefaults on kiosk type machines, where graphical user has no permission to execute arbitrary operating system commands or sometimes not even to send hardware keyboard keystrokes, the .Xdefaults must not be modifiable by the user.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libX11: missing request length checks"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3399
Vulnerability from csaf_redhat - Published: 2021-08-31 19:48 - Updated: 2025-11-21 18:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975163)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3399",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3399.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:24:43+00:00",
"generator": {
"date": "2025-11-21T18:24:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3399",
"initial_release_date": "2021-08-31T19:48:07+00:00",
"revision_history": [
{
"date": "2021-08-31T19:48:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T19:48:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:24:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product_id": "kernel-0:3.10.0-327.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021_3399
Vulnerability from csaf_redhat - Published: 2021-08-31 19:48 - Updated: 2024-11-15 11:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975163)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3399",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3399.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:55:52+00:00",
"generator": {
"date": "2024-11-15T11:55:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3399",
"initial_release_date": "2021-08-31T19:48:07+00:00",
"revision_history": [
{
"date": "2021-08-31T19:48:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T19:48:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product_id": "kernel-0:3.10.0-327.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021_3725
Vulnerability from csaf_redhat - Published: 2021-10-05 07:56 - Updated: 2024-11-22 17:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3725",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3725.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T17:16:18+00:00",
"generator": {
"date": "2024-11-22T17:16:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3725",
"initial_release_date": "2021-10-05T07:56:00+00:00",
"revision_history": [
{
"date": "2021-10-05T07:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-05T07:56:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:16:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product_id": "kernel-0:3.10.0-693.94.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.94.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.94.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
RHSA-2021_3380
Vulnerability from csaf_redhat - Published: 2021-08-31 09:18 - Updated: 2024-11-15 11:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3380",
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3380.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:32+00:00",
"generator": {
"date": "2024-11-15T11:55:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3380",
"initial_release_date": "2021-08-31T09:18:03+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3375
Vulnerability from csaf_redhat - Published: 2021-08-31 08:56 - Updated: 2025-11-21 18:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3375",
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3375.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:24:41+00:00",
"generator": {
"date": "2025-11-21T18:24:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3375",
"initial_release_date": "2021-08-31T08:56:13+00:00",
"revision_history": [
{
"date": "2021-08-31T08:56:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:56:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:24:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021_3044
Vulnerability from csaf_redhat - Published: 2021-08-10 11:21 - Updated: 2024-11-15 11:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3044",
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3044.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:54:29+00:00",
"generator": {
"date": "2024-11-15T11:54:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3044",
"initial_release_date": "2021-08-10T11:21:13+00:00",
"revision_history": [
{
"date": "2021-08-10T11:21:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-10T11:21:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:54:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-3.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_10_2-debuginfo@1-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-10T11:21:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3044"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-4.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_10_2-debugsource-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-3.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
}
]
}
RHSA-2021:3363
Vulnerability from csaf_redhat - Published: 2021-08-31 09:30 - Updated: 2025-11-21 18:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3363",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3363.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:24:39+00:00",
"generator": {
"date": "2025-11-21T18:24:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3363",
"initial_release_date": "2021-08-31T09:30:45+00:00",
"revision_history": [
{
"date": "2021-08-31T09:30:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:24:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf