Action not permitted
Modal body text goes here.
cve-2017-16994
Vulnerability from cvelistv5
Published
2017-11-27 19:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:43:57.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3617-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3619-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1431" }, { "name": "USN-3617-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "43178", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43178/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2" }, { "name": "USN-3632-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3632-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "name": "RHSA-2018:0502", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0502" }, { "name": "USN-3617-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3617-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "name": "USN-3619-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3619-1/" }, { "name": "101969", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101969" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-24T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-3617-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3619-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1431" }, { "name": "USN-3617-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "43178", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43178/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2" }, { "name": "USN-3632-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3632-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "name": "RHSA-2018:0502", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0502" }, { "name": "USN-3617-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3617-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "name": "USN-3619-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3619-1/" }, { "name": "101969", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101969" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3617-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1431", "refsource": "CONFIRM", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1431" }, { "name": "USN-3617-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "43178", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43178/" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2" }, { "name": "USN-3632-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "name": "RHSA-2018:0502", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0502" }, { "name": "USN-3617-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "name": "USN-3619-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-1/" }, { "name": "101969", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101969" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16994", "datePublished": "2017-11-27T19:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-08-05T20:43:57.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-16994\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-11-27T19:29:00.423\",\"lastModified\":\"2018-04-25T01:29:02.240\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n walk_hugetlb_range en mm/pagewalk.c en el kernel de Linux en versiones anteriores a la 4.14.2 gestiona de manera incorrecta los agujeros en los rangos hugetlb, lo que permite que usuarios locales obtengan informaci\u00f3n sensible de la memoria del kernel no inicializada mediante el uso manipulado de la llamada del sistema mincore().\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":2.1},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.14.2\",\"matchCriteriaId\":\"8BFBFB82-9C5E-45C1-AD36-05E379DAE87F\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"http://www.securityfocus.com/bid/101969\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0502\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1431\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://usn.ubuntu.com/3617-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3617-2/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3617-3/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3619-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3619-2/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3632-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/43178/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
rhsa-2018_0502
Vulnerability from csaf_redhat
Published
2018-03-13 15:39
Modified
2024-11-22 11:46
Summary
Red Hat Security Advisory: kernel-alt security and bug fix update
Notes
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important)(ppc only)
* kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak (CVE-2017-17712, Important)
* kernel: mm/pagewalk.c:walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak (CVE-2017-16994, Moderate)
Bug Fix(es):
* When changing the Maximum Transmission Unit (MTU) size on Broadcom BCM5717, BCM5718 and BCM5719 chipsets, the tg3 driver sometimes lost synchronization with the device. Consequently, the device became unresponsive. With this update, tg3 has been fixed, and devices no longer hang due to this behavior. (BZ#1533478)
* Previously, the perf tool used strict string matching to provide related events to a particular CPUID instruction. Consequently, the events were not available on certain IBM PowerPC systems. This update fixes perf to use regular expressions instead of string matching of the entire CPUID string. As a result, the perf tool now supports events on IBM PowerPC architectures as expected. (BZ#1536567)
* Previously, the kernel debugfs file system implemented removal protection based on sleepable read-copy-update (SRCU), which slowed down the drivers relying on the debugfs_remove_recursive() function. Consequently, a decrease in performance or a deadlock sometimes occurred. This update implements per-file removal protection in debugfs. As a result, the performance of the system has improved significantly. (BZ#1538030)
* When running the 'perf test' command on a PowerKVM guest multiple times, the branch instructions recorded in Branch History Rolling Buffer (BHRB) entries were sometimes unmapped before the kernel processed the entries. Consequently, the operating system terminated unexpectedly. This update fixes the bug, and the operating system no longer crashes in the described situation. (BZ#1538031)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important)(ppc only)\n\n* kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak (CVE-2017-17712, Important)\n\n* kernel: mm/pagewalk.c:walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak (CVE-2017-16994, Moderate)\n\nBug Fix(es):\n\n* When changing the Maximum Transmission Unit (MTU) size on Broadcom BCM5717, BCM5718 and BCM5719 chipsets, the tg3 driver sometimes lost synchronization with the device. Consequently, the device became unresponsive. With this update, tg3 has been fixed, and devices no longer hang due to this behavior. (BZ#1533478)\n\n* Previously, the perf tool used strict string matching to provide related events to a particular CPUID instruction. Consequently, the events were not available on certain IBM PowerPC systems. This update fixes perf to use regular expressions instead of string matching of the entire CPUID string. As a result, the perf tool now supports events on IBM PowerPC architectures as expected. (BZ#1536567)\n\n* Previously, the kernel debugfs file system implemented removal protection based on sleepable read-copy-update (SRCU), which slowed down the drivers relying on the debugfs_remove_recursive() function. Consequently, a decrease in performance or a deadlock sometimes occurred. This update implements per-file removal protection in debugfs. As a result, the performance of the system has improved significantly. (BZ#1538030)\n\n* When running the \u0027perf test\u0027 command on a PowerKVM guest multiple times, the branch instructions recorded in Branch History Rolling Buffer (BHRB) entries were sometimes unmapped before the kernel processed the entries. Consequently, the operating system terminated unexpectedly. This update fixes the bug, and the operating system no longer crashes in the described situation. (BZ#1538031)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0502", "url": "https://access.redhat.com/errata/RHSA-2018:0502" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1518155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518155" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "1526427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526427" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0502.json" } ], "title": "Red Hat Security Advisory: kernel-alt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T11:46:58+00:00", "generator": { "date": "2024-11-22T11:46:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0502", "initial_release_date": "2018-03-13T15:39:22+00:00", "revision_history": [ { "date": "2018-03-13T15:39:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-13T15:39:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:46:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "perf-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "perf-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "python-perf-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "python-perf-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "python-perf-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.11.0-44.6.1.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "product": { "name": "kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "product_id": "kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.11.0-44.6.1.el7a?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "perf-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "perf-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.11.0-44.6.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "product": { "name": "kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "product_id": "kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.11.0-44.6.1.el7a?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "product": { "name": "kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "product_id": "kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.11.0-44.6.1.el7a?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "product": { "name": "kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "product_id": "kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.11.0-44.6.1.el7a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-alt-0:4.11.0-44.6.1.el7a.src", "product": { "name": "kernel-alt-0:4.11.0-44.6.1.el7a.src", "product_id": "kernel-alt-0:4.11.0-44.6.1.el7a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-alt@4.11.0-44.6.1.el7a?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.11.0-44.6.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src" }, "product_reference": "kernel-alt-0:4.11.0-44.6.1.el7a.src", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.11.0-44.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "perf-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "perf-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "python-perf-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.11.0-44.6.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src" }, "product_reference": "kernel-alt-0:4.11.0-44.6.1.el7a.src", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.11.0-44.6.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "perf-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "perf-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "python-perf-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64" }, "product_reference": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-16994", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1518155" } ], "notes": [ { "category": "description", "text": "The walk_hugetlb_range() function in \u0027mm/pagewalk.c\u0027 file in the Linux kernel from v4.0-rc1 through v4.15-rc1 mishandles holes in hugetlb ranges. This allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm/pagewalk.c: walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2, as a code with the flaw is not present in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE in the \"kernel-alt\" packages.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-optional-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16994" }, { "category": "external", "summary": "RHBZ#1518155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518155" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16994", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16994" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16994", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16994" } ], "release_date": "2017-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-13T15:39:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-optional-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0502" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-optional-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mm/pagewalk.c: walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak" }, { "cve": "CVE-2017-17712", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2017-12-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1526427" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of raw_sendmsg allowing a local attacker to panic the kernel or possibly leak kernel addresses. A local attacker, with the privilege of creating raw sockets, can abuse a possible race condition when setting the socket option to allow the kernel to automatically create ip header values and thus potentially escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 as they do not contain the upstream commit (c008ba5bdc9f) that allows this issue to be exploited.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux for Power LE.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-optional-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17712" }, { "category": "external", "summary": "RHBZ#1526427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526427" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17712", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17712" } ], "release_date": "2017-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-13T15:39:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-optional-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0502" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-abi-whitelists-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-alt-0:4.11.0-44.6.1.el7a.src", "7Server-optional-RHELALT-7.4:kernel-bootwrapper-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debug-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-aarch64-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-debuginfo-common-ppc64le-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-doc-0:4.11.0-44.6.1.el7a.noarch", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-headers-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:kernel-tools-libs-devel-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-0:4.11.0-44.6.1.el7a.ppc64le", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.aarch64", "7Server-optional-RHELALT-7.4:python-perf-debuginfo-0:4.11.0-44.6.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak" } ] }
gsd-2017-16994
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-16994", "description": "The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.", "id": "GSD-2017-16994", "references": [ "https://www.suse.com/security/cve/CVE-2017-16994.html", "https://access.redhat.com/errata/RHSA-2018:0502", "https://ubuntu.com/security/CVE-2017-16994", "https://advisories.mageia.org/CVE-2017-16994.html", "https://alas.aws.amazon.com/cve/html/CVE-2017-16994.html", "https://linux.oracle.com/cve/CVE-2017-16994.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-16994" ], "details": "The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.", "id": "GSD-2017-16994", "modified": "2023-12-13T01:21:01.003318Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3617-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1431", "refsource": "CONFIRM", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1431" }, { "name": "USN-3617-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "43178", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43178/" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2" }, { "name": "USN-3632-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3632-1/" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "name": "RHSA-2018:0502", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0502" }, { "name": "USN-3617-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "name": "USN-3619-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3619-1/" }, { "name": "101969", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101969" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.14.2", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16994" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1431", "refsource": "CONFIRM", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1431" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2", "refsource": "CONFIRM", "tags": [ "Release Notes" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "name": "101969", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101969" }, { "name": "43178", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43178/" }, { "name": "RHSA-2018:0502", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2018:0502" }, { "name": "USN-3617-2", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3617-2/" }, { "name": "USN-3617-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3617-1/" }, { "name": "USN-3619-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3619-1/" }, { "name": "USN-3617-3", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3617-3/" }, { "name": "USN-3619-2", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3619-2/" }, { "name": "USN-3632-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3632-1/" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2018-04-25T01:29Z", "publishedDate": "2017-11-27T19:29Z" } } }
ghsa-3h5j-qwmx-f9m6
Vulnerability from github
Published
2022-05-14 03:29
Modified
2022-05-14 03:29
Severity ?
Details
The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.
{ "affected": [], "aliases": [ "CVE-2017-16994" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-11-27T19:29:00Z", "severity": "MODERATE" }, "details": "The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.", "id": "GHSA-3h5j-qwmx-f9m6", "modified": "2022-05-14T03:29:32Z", "published": "2022-05-14T03:29:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16994" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0502" }, { "type": "WEB", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1431" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3617-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3617-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3617-3" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3619-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3619-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3632-1" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/43178" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/101969" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.